Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-12801 (GCVE-0-2025-12801)
Vulnerability from cvelistv5 – Published: 2026-03-04 15:25 – Updated: 2026-04-01 09:18- CWE-279 - Incorrect Execution-Assigned Permissions
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 10 |
Unaffected:
1:2.8.3-0.el10_1.3 , < *
(rpm)
cpe:/o:redhat:enterprise_linux:10.1 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-12801",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-04T16:16:10.569638Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-04T16:16:16.509Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10.1"
],
"defaultStatus": "affected",
"packageName": "nfs-utils",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "1:2.8.3-0.el10_1.3",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
],
"defaultStatus": "affected",
"packageName": "nfs-utils",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "1:2.3.3-68.el8_10",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
],
"defaultStatus": "affected",
"packageName": "nfs-utils",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "1:2.5.4-38.el9_7.3",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
],
"defaultStatus": "affected",
"packageName": "nfs-utils",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "1:2.5.4-38.el9_7.3",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::crb",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
],
"defaultStatus": "affected",
"packageName": "nfs-utils",
"product": "Red Hat Enterprise Linux 9.4 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "1:2.5.4-26.el9_4.3",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_eus:9.6::baseos",
"cpe:/a:redhat:rhel_eus:9.6::appstream",
"cpe:/a:redhat:rhel_eus:9.6::crb"
],
"defaultStatus": "affected",
"packageName": "nfs-utils",
"product": "Red Hat Enterprise Linux 9.6 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "1:2.5.4-34.el9_6.3",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4.17::el9"
],
"defaultStatus": "affected",
"packageName": "rhcos",
"product": "Red Hat OpenShift Container Platform 4.17",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "417.94.202603242359-0",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4.18::el9"
],
"defaultStatus": "affected",
"packageName": "rhcos",
"product": "Red Hat OpenShift Container Platform 4.18",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "418.94.202603181125-0",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:ceph_storage:8::el9"
],
"defaultStatus": "affected",
"packageName": "rhceph/rhceph-8-rhel9",
"product": "Red Hat Ceph Storage 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "unknown",
"packageName": "nfs-utils",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "unknown",
"packageName": "nfs-utils-lib",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7"
],
"defaultStatus": "affected",
"packageName": "nfs-utils",
"product": "Red Hat Enterprise Linux 7",
"vendor": "Red Hat"
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Simon Hall for reporting this issue."
}
],
"datePublic": "2026-03-04T15:06:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any \u0027root_squash\u0027 or \u0027all_squash\u0027 attributes that would normally be expected to apply to that client."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Moderate"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-279",
"description": "Incorrect Execution-Assigned Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-01T09:18:16.306Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2026:3938",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3938"
},
{
"name": "RHSA-2026:3939",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3939"
},
{
"name": "RHSA-2026:3940",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3940"
},
{
"name": "RHSA-2026:3941",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3941"
},
{
"name": "RHSA-2026:3942",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3942"
},
{
"name": "RHSA-2026:5127",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:5127"
},
{
"name": "RHSA-2026:5606",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
},
{
"name": "RHSA-2026:5867",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:5867"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-12801"
},
{
"name": "RHBZ#2413081",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-11-06T12:15:57.744Z",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2026-03-04T15:06:00.000Z",
"value": "Made public."
}
],
"title": "Nfs-utils: rpc.mountd in the nfs-utils privilege escalation",
"workarounds": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
}
],
"x_generator": {
"engine": "cvelib 1.8.0"
},
"x_redhatCweChain": "CWE-279: Incorrect Execution-Assigned Permissions"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2025-12801",
"datePublished": "2026-03-04T15:25:53.403Z",
"dateReserved": "2025-11-06T12:17:26.749Z",
"dateUpdated": "2026-04-01T09:18:16.306Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-12801\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2026-03-04T16:16:23.900\",\"lastModified\":\"2026-04-01T10:16:15.107\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any \u0027root_squash\u0027 or \u0027all_squash\u0027 attributes that would normally be expected to apply to that client.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad fue descubierta recientemente en el demonio rpc.mountd del paquete nfs-utils para Linux, que permite a un cliente NFSv3 escalar los privilegios asignados a \u00e9l en el archivo /etc/exports en el momento del montaje. En particular, permite al cliente acceder a cualquier subdirectorio o sub\u00e1rbol de un directorio exportado, independientemente de los permisos de archivo establecidos, e independientemente de cualquier atributo \u0027root_squash\u0027 o \u0027all_squash\u0027 que normalmente se esperar\u00eda que se aplicaran a ese cliente.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-279\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-732\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"932D137F-528B-4526-9A89-CD59FA1AB0FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6FB57C-2BC7-487C-96DD-132683AEB35D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D65C2163-CFC2-4ABB-8F4E-CB09CEBD006C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linux-nfs:nfs-utils:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FD2E9BF-0932-4362-923C-BC98473536C3\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2026:3938\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:3939\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:3940\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:3941\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:3942\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:5127\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:5606\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:5867\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2025-12801\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2413081\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-12801\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-04T16:16:10.569638Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-04T16:16:13.021Z\"}}], \"cna\": {\"title\": \"Nfs-utils: rpc.mountd in the nfs-utils privilege escalation\", \"credits\": [{\"lang\": \"en\", \"value\": \"Red Hat would like to thank Simon Hall for reporting this issue.\"}], \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Moderate\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10.1\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1:2.8.3-0.el10_1.3\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"nfs-utils\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::crb\", \"cpe:/o:redhat:enterprise_linux:8::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1:2.3.3-68.el8_10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"nfs-utils\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::baseos\", \"cpe:/a:redhat:enterprise_linux:9::appstream\", \"cpe:/a:redhat:enterprise_linux:9::crb\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1:2.5.4-38.el9_7.3\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"nfs-utils\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::baseos\", \"cpe:/a:redhat:enterprise_linux:9::appstream\", \"cpe:/a:redhat:enterprise_linux:9::crb\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1:2.5.4-38.el9_7.3\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"nfs-utils\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:9.4::appstream\", \"cpe:/a:redhat:rhel_eus:9.4::crb\", \"cpe:/o:redhat:rhel_eus:9.4::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.4 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1:2.5.4-26.el9_4.3\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"nfs-utils\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_eus:9.6::baseos\", \"cpe:/a:redhat:rhel_eus:9.6::appstream\", \"cpe:/a:redhat:rhel_eus:9.6::crb\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.6 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1:2.5.4-34.el9_6.3\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"nfs-utils\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4.17::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4.17\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"417.94.202603242359-0\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhcos\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4.18::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4.18\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"418.94.202603181125-0\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhcos\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:ceph_storage:8::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Ceph Storage 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"rhceph/rhceph-8-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"nfs-utils\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"nfs-utils-lib\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"packageName\": \"nfs-utils\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-11-06T12:15:57.744Z\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2026-03-04T15:06:00.000Z\", \"value\": \"Made public.\"}], \"datePublic\": \"2026-03-04T15:06:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2026:3938\", \"name\": \"RHSA-2026:3938\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:3939\", \"name\": \"RHSA-2026:3939\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:3940\", \"name\": \"RHSA-2026:3940\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:3941\", \"name\": \"RHSA-2026:3941\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:3942\", \"name\": \"RHSA-2026:3942\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:5127\", \"name\": \"RHSA-2026:5127\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:5606\", \"name\": \"RHSA-2026:5606\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:5867\", \"name\": \"RHSA-2026:5867\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2025-12801\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2413081\", \"name\": \"RHBZ#2413081\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.\"}], \"x_generator\": {\"engine\": \"cvelib 1.8.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any \u0027root_squash\u0027 or \u0027all_squash\u0027 attributes that would normally be expected to apply to that client.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-279\", \"description\": \"Incorrect Execution-Assigned Permissions\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2026-04-01T09:18:16.306Z\"}, \"x_redhatCweChain\": \"CWE-279: Incorrect Execution-Assigned Permissions\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-12801\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-01T09:18:16.306Z\", \"dateReserved\": \"2025-11-06T12:17:26.749Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2026-03-04T15:25:53.403Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:3941
Vulnerability from csaf_redhat - Published: 2026-03-06 08:17 - Updated: 2026-04-01 10:07A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for nfs-utils is now available for Red Hat Enterprise Linux 9.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. \n\nSecurity Fix(es):\n\n* nfs-utils: rpc.mountd in the nfs-utils privilege escalation (CVE-2025-12801)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3941",
"url": "https://access.redhat.com/errata/RHSA-2026:3941"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3941.json"
}
],
"title": "Red Hat Security Advisory: nfs-utils security update",
"tracking": {
"current_release_date": "2026-04-01T10:07:22+00:00",
"generator": {
"date": "2026-04-01T10:07:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:3941",
"initial_release_date": "2026-03-06T08:17:05+00:00",
"revision_history": [
{
"date": "2026-03-06T08:17:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-06T08:17:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T10:07:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"product": {
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"product_id": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos@2.5.4-34.el9_6.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"product": {
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"product_id": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils@2.5.4-34.el9_6.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"product": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"product_id": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.5.4-34.el9_6.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"product": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"product_id": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.5.4-34.el9_6.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"product_id": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.5.4-34.el9_6.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"product": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"product_id": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.5.4-34.el9_6.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"product_id": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.5.4-34.el9_6.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"product": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"product_id": "libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.5.4-34.el9_6.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"product": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"product_id": "nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.5.4-34.el9_6.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"product": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"product_id": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.5.4-34.el9_6.3?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"product": {
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"product_id": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos@2.5.4-34.el9_6.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"product": {
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"product_id": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils@2.5.4-34.el9_6.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"product": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"product_id": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.5.4-34.el9_6.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"product": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"product_id": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.5.4-34.el9_6.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"product_id": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.5.4-34.el9_6.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"product": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"product_id": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.5.4-34.el9_6.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"product_id": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.5.4-34.el9_6.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"product": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"product_id": "libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.5.4-34.el9_6.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"product": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"product_id": "nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.5.4-34.el9_6.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"product": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"product_id": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.5.4-34.el9_6.3?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"product": {
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"product_id": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos@2.5.4-34.el9_6.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"product": {
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"product_id": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils@2.5.4-34.el9_6.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"product": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"product_id": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.5.4-34.el9_6.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"product": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"product_id": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.5.4-34.el9_6.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"product_id": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.5.4-34.el9_6.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"product": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"product_id": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.5.4-34.el9_6.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"product_id": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.5.4-34.el9_6.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"product": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"product_id": "libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.5.4-34.el9_6.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"product": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"product_id": "nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.5.4-34.el9_6.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"product": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"product_id": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.5.4-34.el9_6.3?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"product": {
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"product_id": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos@2.5.4-34.el9_6.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"product": {
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"product_id": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils@2.5.4-34.el9_6.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"product": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"product_id": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.5.4-34.el9_6.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"product": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"product_id": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.5.4-34.el9_6.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"product_id": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.5.4-34.el9_6.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"product": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"product_id": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.5.4-34.el9_6.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"product_id": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.5.4-34.el9_6.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"product": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"product_id": "libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.5.4-34.el9_6.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"product": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"product_id": "nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.5.4-34.el9_6.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"product": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"product_id": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.5.4-34.el9_6.3?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"product": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"product_id": "libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.5.4-34.el9_6.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"product": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"product_id": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.5.4-34.el9_6.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"product": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"product_id": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.5.4-34.el9_6.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"product_id": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.5.4-34.el9_6.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"product": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"product_id": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.5.4-34.el9_6.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"product_id": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.5.4-34.el9_6.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"product": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"product_id": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.5.4-34.el9_6.3?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-1:2.5.4-34.el9_6.3.src",
"product": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.src",
"product_id": "nfs-utils-1:2.5.4-34.el9_6.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.5.4-34.el9_6.3?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.src"
},
"product_reference": "nfs-utils-1:2.5.4-34.el9_6.3.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.src"
},
"product_reference": "nfs-utils-1:2.5.4-34.el9_6.3.src",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.src"
},
"product_reference": "nfs-utils-1:2.5.4-34.el9_6.3.src",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.6)",
"product_id": "CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"relates_to_product_reference": "CRB-9.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Simon Hall"
]
}
],
"cve": "CVE-2025-12801",
"cwe": {
"id": "CWE-279",
"name": "Incorrect Execution-Assigned Permissions"
},
"discovery_date": "2025-11-06T12:15:57.744000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2413081"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any \u0027root_squash\u0027 or \u0027all_squash\u0027 attributes that would normally be expected to apply to that client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This MODERATE impact vulnerability in `rpc.mountd` within the `nfs-utils` package allows an authenticated NFSv3 client to bypass configured `root_squash` or `all_squash` restrictions. This enables the client to access subdirectories of an exported NFS share with elevated privileges, regardless of the intended file permissions. Red Hat Enterprise Linux systems configured as NFSv3 servers are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.src",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.src",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.src",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12801"
},
{
"category": "external",
"summary": "RHBZ#2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801"
}
],
"release_date": "2026-03-04T15:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-06T08:17:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.src",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.src",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.src",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3941"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.src",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.src",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.src",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.src",
"AppStream-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"AppStream-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.src",
"BaseOS-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"BaseOS-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:libnfsidmap-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:libnfsidmap-devel-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.src",
"CRB-9.6.0.Z.EUS:nfs-utils-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-1:2.5.4-34.el9_6.3.x86_64",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.aarch64",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.i686",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.ppc64le",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.s390x",
"CRB-9.6.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-34.el9_6.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation"
}
]
}
RHSA-2026:5606
Vulnerability from csaf_redhat - Published: 2026-03-24 10:00 - Updated: 2026-04-01 10:07A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.
A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).
A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.
A flaw was found in the imaplib module in the Python standard library. The imaplib module does not reject control characters, such as newlines, in user-controlled input passed to IMAP commands. This issue allows an attacker to inject additional commands to be executed in the IMAP server.
A flaw was found in the poplib module in the Python standard library. The poplib module does not reject control characters, such as newlines, in user-controlled input passed to POP3 commands. This issue allows an attacker to inject additional commands to be executed in the POP3 server.
A flaw was found in the glibc library. Passing an excessively large alignment value to the memalign suite of functions, such as memalign, posix_memalign, aligned_alloc, valloc and pvalloc, an integer overflow can occur during internal size calculations due to improper overflow checks, causing an allocation of a small chunk of memory which is subsequently used for writing. This issue can result in an application crash or heap memory corruption.
Missing newline filtering has been discovered in Python. User-controlled header names and values containing newlines can allow injecting HTTP headers.
A flaw was found in glibc, the GNU C Library. When an application calls the `getnetbyaddr` or `getnetbyaddr_r` functions to resolve a network address, and the system's `nsswitch.conf` file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.
A flaw was found in the email module in the Python standard library. When serializing an email message, the BytesGenerator class fails to properly quote newline characters for email headers. This issue is exploitable when the LiteralHeader class is used as it does not respect email folding rules, allowing an attacker to inject email headers and potentially modify message recipients or the email body, and spoof sender information.
A flaw was found in libpng, a reference library for processing PNG (Portable Network Graphics) image files. A local attacker could exploit a heap buffer over-read vulnerability in the `png_image_finish_read` function by tricking a user into processing a specially crafted interlaced 16-bit PNG file with an 8-bit output format and non-minimal row stride. This could lead to a denial of service (DoS) and potentially information disclosure.
A flaw was found in libpng, a reference library for PNG (Portable Network Graphics) raster image files. An integer truncation vulnerability exists in the png_write_image_16bit and png_write_image_8bit simplified write API functions. A local attacker could exploit this flaw by providing a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes, leading to a heap buffer over-read. This can result in information disclosure or a denial of service (DoS) to the system.
A flaw was found in pyasn1, a generic ASN.1 library for Python. A remote attacker could exploit this vulnerability by sending a specially crafted RELATIVE-OID with excessive continuation octets. This input validation vulnerability leads to memory exhaustion, resulting in a Denial of Service (DoS) for the affected system.
A heap based buffer overflow flaw has been discovered in LibPNG. Prior to version 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user's display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new version of Red Hat build of Ceph Storage has been released",
"title": "Topic"
},
{
"category": "general",
"text": "The Red Hat Storage Ceph container images are based on the latest ubi9 base image and Ceph 8.1.\nThis release updates to the latest version.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5606",
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12801",
"url": "https://access.redhat.com/security/cve/CVE-2025-12801"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14831",
"url": "https://access.redhat.com/security/cve/CVE-2025-14831"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15281",
"url": "https://access.redhat.com/security/cve/CVE-2025-15281"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15366",
"url": "https://access.redhat.com/security/cve/CVE-2025-15366"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15367",
"url": "https://access.redhat.com/security/cve/CVE-2025-15367"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-9820",
"url": "https://access.redhat.com/security/cve/CVE-2025-9820"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-0861",
"url": "https://access.redhat.com/security/cve/CVE-2026-0861"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-0865",
"url": "https://access.redhat.com/security/cve/CVE-2026-0865"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-0915",
"url": "https://access.redhat.com/security/cve/CVE-2026-0915"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-1299",
"url": "https://access.redhat.com/security/cve/CVE-2026-1299"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22695",
"url": "https://access.redhat.com/security/cve/CVE-2026-22695"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22801",
"url": "https://access.redhat.com/security/cve/CVE-2026-22801"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-23490",
"url": "https://access.redhat.com/security/cve/CVE-2026-23490"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25646",
"url": "https://access.redhat.com/security/cve/CVE-2026-25646"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/",
"url": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5606.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Ceph Storage",
"tracking": {
"current_release_date": "2026-04-01T10:07:25+00:00",
"generator": {
"date": "2026-04-01T10:07:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:5606",
"initial_release_date": "2026-03-24T10:00:07+00:00",
"revision_history": [
{
"date": "2026-03-24T10:00:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-24T10:00:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T10:07:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ceph Storage 8",
"product": {
"name": "Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ceph_storage:8::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ceph Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3A1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1774002867"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3Aba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1774002867"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3Aa0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1774002867"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3A2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1774002867"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-9820",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-09-02T10:00:18.839000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2392528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: Stack-based Buffer Overflow in gnutls_pkcs11_token_init() Function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has assessed the severity of this vulnerability as Low, since exploitation requires local access or a malicious PKCS#11 token. While the impact is limited to denial of service or potential code execution in constrained scenarios, the vulnerability stems from a lack of proper bounds checking during token label handling in GnuTLS. Users should treat this as a security concern in environments where untrusted tokens may be introduced.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9820"
},
{
"category": "external",
"summary": "RHBZ#2392528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9820"
},
{
"category": "external",
"summary": "https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5",
"url": "https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5"
},
{
"category": "external",
"summary": "https://gitlab.com/gnutls/gnutls/-/issues/1732",
"url": "https://gitlab.com/gnutls/gnutls/-/issues/1732"
},
{
"category": "external",
"summary": "https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18",
"url": "https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18"
}
],
"release_date": "2025-11-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T10:00:07+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. Applying the upstream patch or vendor-supplied security update is the recommended resolution.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "gnutls: Stack-based Buffer Overflow in gnutls_pkcs11_token_init() Function"
},
{
"acknowledgments": [
{
"names": [
"Simon Hall"
]
}
],
"cve": "CVE-2025-12801",
"cwe": {
"id": "CWE-279",
"name": "Incorrect Execution-Assigned Permissions"
},
"discovery_date": "2025-11-06T12:15:57.744000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2413081"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any \u0027root_squash\u0027 or \u0027all_squash\u0027 attributes that would normally be expected to apply to that client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This MODERATE impact vulnerability in `rpc.mountd` within the `nfs-utils` package allows an authenticated NFSv3 client to bypass configured `root_squash` or `all_squash` restrictions. This enables the client to access subdirectories of an exported NFS share with elevated privileges, regardless of the intended file permissions. Red Hat Enterprise Linux systems configured as NFSv3 servers are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12801"
},
{
"category": "external",
"summary": "RHBZ#2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801"
}
],
"release_date": "2026-03-04T15:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T10:00:07+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation"
},
{
"cve": "CVE-2025-14831",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2025-12-17T14:48:30.222000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423177"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: GnuTLS: Denial of Service via excessive resource consumption during certificate verification",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat. GnuTLS is susceptible to a denial of service attack due to excessive CPU and memory consumption. This occurs when processing specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs) during certificate verification.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14831"
},
{
"category": "external",
"summary": "RHBZ#2423177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423177"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14831",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14831"
},
{
"category": "external",
"summary": "https://gitlab.com/gnutls/gnutls/-/issues/1773",
"url": "https://gitlab.com/gnutls/gnutls/-/issues/1773"
}
],
"release_date": "2026-02-09T14:26:34.939000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T10:00:07+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: GnuTLS: Denial of Service via excessive resource consumption during certificate verification"
},
{
"cve": "CVE-2025-15281",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2026-01-20T14:01:12.320264+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431196"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to find an application linked to the glibc library that is using the wordexp function with the flags WRDE_REUSE and WRDE_APPEND. Also, calls to wordexp using both flags never worked correctly and thus the existence of applications that make use of this feature is unlikely. There is no known application vulnerable to this issue.\n\nFurthermore, this flaw will result in a denial of service with no other security impact.\n\nDue to these reasons, this vulnerability has been rated with a low severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15281"
},
{
"category": "external",
"summary": "RHBZ#2431196",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431196"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15281",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15281"
},
{
"category": "external",
"summary": "https://sourceware.org/bugzilla/show_bug.cgi?id=33814",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33814"
}
],
"release_date": "2026-01-20T13:22:46.495000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T10:00:07+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
},
{
"category": "workaround",
"details": "To mitigate this issue, consider refactoring the use of the wordexp function to not use the WRDE_REUSE and WRDE_APPEND flags together.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory"
},
{
"cve": "CVE-2025-15366",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2026-01-20T22:01:33.257688+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431368"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the imaplib module in the Python standard library. The imaplib module does not reject control characters, such as newlines, in user-controlled input passed to IMAP commands. This issue allows an attacker to inject additional commands to be executed in the IMAP server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: IMAP command injection in user-controlled commands",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to have the privileges required to send malicious input to an application that sends IMAP commands to a server. Additionally, this flaw can allow attackers to manipulate the state of the mailbox (e.g., delete emails, move folders, flag messages) and to potentially read metadata or specific email content, but it does not allow arbitrary code execution or OS command injection. Due to these reasons, this issue has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15366"
},
{
"category": "external",
"summary": "RHBZ#2431368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431368"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15366",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15366"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/143921",
"url": "https://github.com/python/cpython/issues/143921"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/143922",
"url": "https://github.com/python/cpython/pull/143922"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/DD7C7JZJYTBXMDOWKCEIEBJLBRU64OMR/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/DD7C7JZJYTBXMDOWKCEIEBJLBRU64OMR/"
}
],
"release_date": "2026-01-20T21:40:24.938000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T10:00:07+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, ensure that no data passed to the imaplib module contains newline or carriage return characters.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: IMAP command injection in user-controlled commands"
},
{
"cve": "CVE-2025-15367",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2026-01-20T22:02:09.399038+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431373"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the poplib module in the Python standard library. The poplib module does not reject control characters, such as newlines, in user-controlled input passed to POP3 commands. This issue allows an attacker to inject additional commands to be executed in the POP3 server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: POP3 command injection in user-controlled commands",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to have the privileges required to send malicious input to an application that sends POP3 commands to a server. Additionally, this flaw can allow attackers to manipulate the state of the mailbox (e.g., delete emails) and to potentially read metadata or specific email content, but it does not allow arbitrary code execution or OS command injection. Due to these reasons, this issue has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15367"
},
{
"category": "external",
"summary": "RHBZ#2431373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15367"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/143923",
"url": "https://github.com/python/cpython/issues/143923"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/143924",
"url": "https://github.com/python/cpython/pull/143924"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/CBFBOWVGGUJFSGITQCCBZS4GEYYZ7ZNE/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/CBFBOWVGGUJFSGITQCCBZS4GEYYZ7ZNE/"
}
],
"release_date": "2026-01-20T21:47:09.885000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T10:00:07+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, ensure that no data passed to the poplib module contains newline or carriage return characters.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: POP3 command injection in user-controlled commands"
},
{
"cve": "CVE-2026-0861",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2026-01-14T22:01:10.975595+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2429771"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the glibc library. Passing an excessively large alignment value to the memalign suite of functions, such as memalign, posix_memalign, aligned_alloc, valloc and pvalloc, an integer overflow can occur during internal size calculations due to improper overflow checks, causing an allocation of a small chunk of memory which is subsequently used for writing. This issue can result in an application crash or heap memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: Integer overflow in memalign leads to heap corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to find an application linked to the glibc library that is using one of the vulnerable functions (memalign, posix_memalign, aligned_alloc, valloc or pvalloc) in a way that the alignment parameter can be user-controlled, allowing an attacker to trigger the integer overflow. However, the alignment parameter used by the functions is usually hard-coded power of two and do not allow arbitrary values, specially values supplied by a user. There is no known application vulnerable to this issue.\n\nAlso, default Red Hat Enterprise Linux security features, including SELinux enforcement, Address Space Layout Randomization (ASLR) and memory protections significantly increase the difficult of achieving arbitrary code execution, limiting the impact of this vulnerability.\n\nDue to these reasons, this vulnerability has been rated with a low severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-0861"
},
{
"category": "external",
"summary": "RHBZ#2429771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429771"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-0861",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0861"
},
{
"category": "external",
"summary": "https://sourceware.org/bugzilla/show_bug.cgi?id=33796",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33796"
}
],
"release_date": "2026-01-14T21:01:11.037000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T10:00:07+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
},
{
"category": "workaround",
"details": "Applications calling one of the vulnerable functions and allowing the alignment parameter to be set by user-controlled input can implement additional validations checks, ensuring the alignment value is a power of two and does not exceed a sane limit, for example the system page size or a maximum of 64KB. This prevents the excessively large value required to trigger the integer overflow.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "glibc: Integer overflow in memalign leads to heap corruption"
},
{
"cve": "CVE-2026-0865",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"discovery_date": "2026-01-20T22:01:26.694713+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431367"
}
],
"notes": [
{
"category": "description",
"text": "Missing newline filtering has been discovered in Python. User-controlled header names and values containing newlines can allow injecting HTTP headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: wsgiref.headers.Headers allows header newline injection in Python",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-0865"
},
{
"category": "external",
"summary": "RHBZ#2431367",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431367"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-0865",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0865"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/143916",
"url": "https://github.com/python/cpython/issues/143916"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/143917",
"url": "https://github.com/python/cpython/pull/143917"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/BJ6QPHNSHJTS3A7CFV6IBMCAP2DWRVNT/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/BJ6QPHNSHJTS3A7CFV6IBMCAP2DWRVNT/"
}
],
"release_date": "2026-01-20T21:26:15.274000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T10:00:07+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: wsgiref.headers.Headers allows header newline injection in Python"
},
{
"cve": "CVE-2026-0915",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2026-01-15T23:01:26.157678+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430201"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in glibc, the GNU C Library. When an application calls the `getnetbyaddr` or `getnetbyaddr_r` functions to resolve a network address, and the system\u0027s `nsswitch.conf` file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: glibc: Information disclosure via zero-valued network query",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. It allows for information disclosure of stack contents to a configured DNS resolver when an application utilizes `getnetbyaddr` or `getnetbyaddr_r` with a DNS backend specified in `nsswitch.conf` for a zero-valued network query. This affects Red Hat Enterprise Linux and OpenShift Container Platform.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-0915"
},
{
"category": "external",
"summary": "RHBZ#2430201",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430201"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-0915",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0915"
},
{
"category": "external",
"summary": "https://sourceware.org/bugzilla/show_bug.cgi?id=33802",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33802"
}
],
"release_date": "2026-01-15T22:08:41.630000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T10:00:07+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glibc: glibc: Information disclosure via zero-valued network query"
},
{
"cve": "CVE-2026-1299",
"cwe": {
"id": "CWE-93",
"name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
},
"discovery_date": "2026-01-23T17:02:57.343486+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2432437"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the email module in the Python standard library. When serializing an email message, the BytesGenerator class fails to properly quote newline characters for email headers. This issue is exploitable when the LiteralHeader class is used as it does not respect email folding rules, allowing an attacker to inject email headers and potentially modify message recipients or the email body, and spoof sender information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: email header injection due to unquoted newlines",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue can only be exploitable by Python applications using the LiteralHeader class to write email headers, as it does not respect email folding rules. Additionally, this issue allows attackers to modify message recipients or the email body and spoof sender identity but it does not cause memory corruption or arbitrary code execution. Due to these reasons, this vulnerability has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1299"
},
{
"category": "external",
"summary": "RHBZ#2432437",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2432437"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1299",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1299"
},
{
"category": "external",
"summary": "https://cve.org/CVERecord?id=CVE-2024-6923",
"url": "https://cve.org/CVERecord?id=CVE-2024-6923"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/052e55e7d44718fe46cbba0ca995cb8fcc359413",
"url": "https://github.com/python/cpython/commit/052e55e7d44718fe46cbba0ca995cb8fcc359413"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/144125",
"url": "https://github.com/python/cpython/issues/144125"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/144126",
"url": "https://github.com/python/cpython/pull/144126"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/6ZZULGALJTITEAGEXLDJE2C6FORDXPBT/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/6ZZULGALJTITEAGEXLDJE2C6FORDXPBT/"
}
],
"release_date": "2026-01-23T16:27:13.346000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T10:00:07+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
},
{
"category": "workaround",
"details": "To mitigate this issue, applications accepting user-supplied data for email headers should sanitize the input by stripping or rejecting any strings containing carriage return or line feed characters, \u0027\\r\u0027 or \u0027\\n\u0027, respectively, preventing malicious sequences that could lead to header manipulation.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: email header injection due to unquoted newlines"
},
{
"cve": "CVE-2026-22695",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2026-01-13T00:08:52.403246+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2428825"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libpng, a reference library for processing PNG (Portable Network Graphics) image files. A local attacker could exploit a heap buffer over-read vulnerability in the `png_image_finish_read` function by tricking a user into processing a specially crafted interlaced 16-bit PNG file with an 8-bit output format and non-minimal row stride. This could lead to a denial of service (DoS) and potentially information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libpng: libpng: Denial of service and information disclosure via heap buffer over-read in png_image_finish_read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. A heap buffer over-read flaw exists in the libpng library when processing specially crafted interlaced 16-bit PNG images with 8-bit output format and non-minimal row stride. This issue requires user interaction, as an attacker would need to trick a user into opening a malicious PNG file.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22695"
},
{
"category": "external",
"summary": "RHBZ#2428825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2428825"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22695",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22695"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea",
"url": "https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/e4f7ad4ea2",
"url": "https://github.com/pnggroup/libpng/commit/e4f7ad4ea2"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/issues/778",
"url": "https://github.com/pnggroup/libpng/issues/778"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/security/advisories/GHSA-mmq5-27w3-rxpp",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-mmq5-27w3-rxpp"
}
],
"release_date": "2026-01-12T22:55:40.204000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T10:00:07+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
},
{
"category": "workaround",
"details": "To mitigate this issue, users should avoid opening untrusted PNG image files. Applications that process PNG images should be configured to restrict processing of untrusted or unverified content where possible.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libpng: libpng: Denial of service and information disclosure via heap buffer over-read in png_image_finish_read"
},
{
"cve": "CVE-2026-22801",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2026-01-13T00:08:42.581146+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2428824"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libpng, a reference library for PNG (Portable Network Graphics) raster image files. An integer truncation vulnerability exists in the png_write_image_16bit and png_write_image_8bit simplified write API functions. A local attacker could exploit this flaw by providing a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes, leading to a heap buffer over-read. This can result in information disclosure or a denial of service (DoS) to the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libpng: libpng: Information disclosure and denial of service via integer truncation in simplified write API",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate for Red Hat products. An integer truncation flaw in the libpng simplified write API functions (`png_write_image_16bit`, `png_write_image_8bit`) can lead to a heap buffer over-read. Exploitation requires an application to process specially crafted input that provides a negative row stride or a stride exceeding 65535 bytes, potentially resulting in denial of service or information disclosure.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22801"
},
{
"category": "external",
"summary": "RHBZ#2428824",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2428824"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22801"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/security/advisories/GHSA-vgjq-8cw5-ggw8",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-vgjq-8cw5-ggw8"
}
],
"release_date": "2026-01-12T22:57:58.288000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T10:00:07+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libpng: libpng: Information disclosure and denial of service via integer truncation in simplified write API"
},
{
"cve": "CVE-2026-23490",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-16T20:03:33.790513+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430472"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in pyasn1, a generic ASN.1 library for Python. A remote attacker could exploit this vulnerability by sending a specially crafted RELATIVE-OID with excessive continuation octets. This input validation vulnerability leads to memory exhaustion, resulting in a Denial of Service (DoS) for the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pyasn1: pyasn1: Denial of Service due to memory exhaustion from malformed RELATIVE-OID",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-23490"
},
{
"category": "external",
"summary": "RHBZ#2430472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430472"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-23490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23490"
},
{
"category": "external",
"summary": "https://github.com/pyasn1/pyasn1/commit/3908f144229eed4df24bd569d16e5991ace44970",
"url": "https://github.com/pyasn1/pyasn1/commit/3908f144229eed4df24bd569d16e5991ace44970"
},
{
"category": "external",
"summary": "https://github.com/pyasn1/pyasn1/releases/tag/v0.6.2",
"url": "https://github.com/pyasn1/pyasn1/releases/tag/v0.6.2"
},
{
"category": "external",
"summary": "https://github.com/pyasn1/pyasn1/security/advisories/GHSA-63vm-454h-vhhq",
"url": "https://github.com/pyasn1/pyasn1/security/advisories/GHSA-63vm-454h-vhhq"
}
],
"release_date": "2026-01-16T19:03:36.442000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T10:00:07+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "pyasn1: pyasn1: Denial of Service due to memory exhaustion from malformed RELATIVE-OID"
},
{
"cve": "CVE-2026-25646",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2026-02-10T18:01:28.232408+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2438542"
}
],
"notes": [
{
"category": "description",
"text": "A heap based buffer overflow flaw has been discovered in LibPNG. Prior to version 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user\u0027s display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libpng: LIBPNG has a heap buffer overflow in png_set_quantize",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For `java-17-openjdk-headless` and `java-21-openjdk-headless`, while the affected code is present in the bundled sources, it is not exercised by these headless packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25646"
},
{
"category": "external",
"summary": "RHBZ#2438542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2438542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25646"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2026/02/09/7",
"url": "http://www.openwall.com/lists/oss-security/2026/02/09/7"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88",
"url": "https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88"
},
{
"category": "external",
"summary": "https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3"
}
],
"release_date": "2026-02-10T17:04:38.501000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-24T10:00:07+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2a73d2ab438040547d61bf4257a50a3d33cb5e74f40d372a865fe0db9ba9d5af_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ba2480ebb7946082380496ad7b92b92560a8bb9ddcd8e2f94f0c502ce65c1d0c_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libpng: LIBPNG has a heap buffer overflow in png_set_quantize"
}
]
}
RHSA-2026:3939
Vulnerability from csaf_redhat - Published: 2026-03-06 08:09 - Updated: 2026-04-01 10:07A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for nfs-utils is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. \n\nSecurity Fix(es):\n\n* nfs-utils: rpc.mountd in the nfs-utils privilege escalation (CVE-2025-12801)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3939",
"url": "https://access.redhat.com/errata/RHSA-2026:3939"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3939.json"
}
],
"title": "Red Hat Security Advisory: nfs-utils security update",
"tracking": {
"current_release_date": "2026-04-01T10:07:22+00:00",
"generator": {
"date": "2026-04-01T10:07:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:3939",
"initial_release_date": "2026-03-06T08:09:49+00:00",
"revision_history": [
{
"date": "2026-03-06T08:09:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-06T08:09:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T10:07:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"product": {
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"product_id": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos@2.8.3-0.el10_1.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"product": {
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"product_id": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils@2.8.3-0.el10_1.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"product": {
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"product_id": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.8.3-0.el10_1.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"product": {
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"product_id": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.8.3-0.el10_1.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"product_id": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.8.3-0.el10_1.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"product": {
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"product_id": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.8.3-0.el10_1.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"product_id": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.8.3-0.el10_1.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"product": {
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"product_id": "libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.8.3-0.el10_1.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"product": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"product_id": "nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.8.3-0.el10_1.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"product": {
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"product_id": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.8.3-0.el10_1.3?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"product": {
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"product_id": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos@2.8.3-0.el10_1.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"product": {
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"product_id": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils@2.8.3-0.el10_1.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"product": {
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"product_id": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.8.3-0.el10_1.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"product": {
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"product_id": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.8.3-0.el10_1.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"product_id": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.8.3-0.el10_1.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"product": {
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"product_id": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.8.3-0.el10_1.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"product_id": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.8.3-0.el10_1.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"product": {
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"product_id": "libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.8.3-0.el10_1.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"product": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"product_id": "nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.8.3-0.el10_1.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"product": {
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"product_id": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.8.3-0.el10_1.3?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"product": {
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"product_id": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos@2.8.3-0.el10_1.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"product": {
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"product_id": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils@2.8.3-0.el10_1.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"product": {
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"product_id": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.8.3-0.el10_1.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"product": {
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"product_id": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.8.3-0.el10_1.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"product_id": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.8.3-0.el10_1.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"product": {
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"product_id": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.8.3-0.el10_1.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"product_id": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.8.3-0.el10_1.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"product": {
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"product_id": "libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.8.3-0.el10_1.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"product": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"product_id": "nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.8.3-0.el10_1.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"product": {
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"product_id": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.8.3-0.el10_1.3?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"product": {
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"product_id": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos@2.8.3-0.el10_1.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"product": {
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"product_id": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils@2.8.3-0.el10_1.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"product": {
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"product_id": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.8.3-0.el10_1.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"product": {
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"product_id": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.8.3-0.el10_1.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"product_id": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.8.3-0.el10_1.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"product": {
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"product_id": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.8.3-0.el10_1.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"product_id": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.8.3-0.el10_1.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"product": {
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"product_id": "libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.8.3-0.el10_1.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"product": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"product_id": "nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.8.3-0.el10_1.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"product": {
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"product_id": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.8.3-0.el10_1.3?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-1:2.8.3-0.el10_1.3.src",
"product": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.src",
"product_id": "nfs-utils-1:2.8.3-0.el10_1.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.8.3-0.el10_1.3?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.src"
},
"product_reference": "nfs-utils-1:2.8.3-0.el10_1.3.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.src as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.src"
},
"product_reference": "nfs-utils-1:2.8.3-0.el10_1.3.src",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.src"
},
"product_reference": "nfs-utils-1:2.8.3-0.el10_1.3.src",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Simon Hall"
]
}
],
"cve": "CVE-2025-12801",
"cwe": {
"id": "CWE-279",
"name": "Incorrect Execution-Assigned Permissions"
},
"discovery_date": "2025-11-06T12:15:57.744000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2413081"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any \u0027root_squash\u0027 or \u0027all_squash\u0027 attributes that would normally be expected to apply to that client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This MODERATE impact vulnerability in `rpc.mountd` within the `nfs-utils` package allows an authenticated NFSv3 client to bypass configured `root_squash` or `all_squash` restrictions. This enables the client to access subdirectories of an exported NFS share with elevated privileges, regardless of the intended file permissions. Red Hat Enterprise Linux systems configured as NFSv3 servers are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.src",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.src",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.src",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12801"
},
{
"category": "external",
"summary": "RHBZ#2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801"
}
],
"release_date": "2026-03-04T15:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-06T08:09:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.src",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.src",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.src",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3939"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.src",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.src",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.src",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.src",
"AppStream-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"AppStream-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.src",
"BaseOS-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"BaseOS-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:libnfsidmap-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:libnfsidmap-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:libnfsidmap-devel-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.src",
"CRB-10.1.Z:nfs-utils-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-coreos-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-coreos-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfs-utils-debugsource-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfsv4-client-utils-1:2.8.3-0.el10_1.3.x86_64",
"CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.aarch64",
"CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.ppc64le",
"CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.s390x",
"CRB-10.1.Z:nfsv4-client-utils-debuginfo-1:2.8.3-0.el10_1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation"
}
]
}
RHSA-2026:3938
Vulnerability from csaf_redhat - Published: 2026-03-05 19:05 - Updated: 2026-04-01 10:07A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for nfs-utils is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. \n\nSecurity Fix(es):\n\n* nfs-utils: rpc.mountd in the nfs-utils privilege escalation (CVE-2025-12801)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3938",
"url": "https://access.redhat.com/errata/RHSA-2026:3938"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3938.json"
}
],
"title": "Red Hat Security Advisory: nfs-utils security update",
"tracking": {
"current_release_date": "2026-04-01T10:07:22+00:00",
"generator": {
"date": "2026-04-01T10:07:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:3938",
"initial_release_date": "2026-03-05T19:05:37+00:00",
"revision_history": [
{
"date": "2026-03-05T19:05:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T19:05:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T10:07:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libnfsidmap-1:2.3.3-68.el8_10.aarch64",
"product": {
"name": "libnfsidmap-1:2.3.3-68.el8_10.aarch64",
"product_id": "libnfsidmap-1:2.3.3-68.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.3.3-68.el8_10?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.3.3-68.el8_10.aarch64",
"product": {
"name": "nfs-utils-1:2.3.3-68.el8_10.aarch64",
"product_id": "nfs-utils-1:2.3.3-68.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.3.3-68.el8_10?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64",
"product": {
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64",
"product_id": "nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.3.3-68.el8_10?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64",
"product": {
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64",
"product_id": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.3.3-68.el8_10?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64",
"product": {
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64",
"product_id": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.3.3-68.el8_10?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64",
"product": {
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64",
"product_id": "libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.3.3-68.el8_10?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libnfsidmap-1:2.3.3-68.el8_10.ppc64le",
"product": {
"name": "libnfsidmap-1:2.3.3-68.el8_10.ppc64le",
"product_id": "libnfsidmap-1:2.3.3-68.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.3.3-68.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.3.3-68.el8_10.ppc64le",
"product": {
"name": "nfs-utils-1:2.3.3-68.el8_10.ppc64le",
"product_id": "nfs-utils-1:2.3.3-68.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.3.3-68.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le",
"product": {
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le",
"product_id": "nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.3.3-68.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"product": {
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"product_id": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.3.3-68.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"product": {
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"product_id": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.3.3-68.el8_10?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le",
"product": {
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le",
"product_id": "libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.3.3-68.el8_10?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libnfsidmap-1:2.3.3-68.el8_10.i686",
"product": {
"name": "libnfsidmap-1:2.3.3-68.el8_10.i686",
"product_id": "libnfsidmap-1:2.3.3-68.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.3.3-68.el8_10?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.i686",
"product": {
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.i686",
"product_id": "nfs-utils-debugsource-1:2.3.3-68.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.3.3-68.el8_10?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686",
"product": {
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686",
"product_id": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.3.3-68.el8_10?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686",
"product": {
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686",
"product_id": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.3.3-68.el8_10?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.i686",
"product": {
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.i686",
"product_id": "libnfsidmap-devel-1:2.3.3-68.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.3.3-68.el8_10?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libnfsidmap-1:2.3.3-68.el8_10.x86_64",
"product": {
"name": "libnfsidmap-1:2.3.3-68.el8_10.x86_64",
"product_id": "libnfsidmap-1:2.3.3-68.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.3.3-68.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.3.3-68.el8_10.x86_64",
"product": {
"name": "nfs-utils-1:2.3.3-68.el8_10.x86_64",
"product_id": "nfs-utils-1:2.3.3-68.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.3.3-68.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64",
"product": {
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64",
"product_id": "nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.3.3-68.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64",
"product": {
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64",
"product_id": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.3.3-68.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64",
"product": {
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64",
"product_id": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.3.3-68.el8_10?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64",
"product": {
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64",
"product_id": "libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.3.3-68.el8_10?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libnfsidmap-1:2.3.3-68.el8_10.s390x",
"product": {
"name": "libnfsidmap-1:2.3.3-68.el8_10.s390x",
"product_id": "libnfsidmap-1:2.3.3-68.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.3.3-68.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.3.3-68.el8_10.s390x",
"product": {
"name": "nfs-utils-1:2.3.3-68.el8_10.s390x",
"product_id": "nfs-utils-1:2.3.3-68.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.3.3-68.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x",
"product": {
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x",
"product_id": "nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.3.3-68.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x",
"product": {
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x",
"product_id": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.3.3-68.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x",
"product": {
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x",
"product_id": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.3.3-68.el8_10?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.s390x",
"product": {
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.s390x",
"product_id": "libnfsidmap-devel-1:2.3.3-68.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.3.3-68.el8_10?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-1:2.3.3-68.el8_10.src",
"product": {
"name": "nfs-utils-1:2.3.3-68.el8_10.src",
"product_id": "nfs-utils-1:2.3.3-68.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.3.3-68.el8_10?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.3.3-68.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.aarch64"
},
"product_reference": "libnfsidmap-1:2.3.3-68.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.3.3-68.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.i686"
},
"product_reference": "libnfsidmap-1:2.3.3-68.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.3.3-68.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.ppc64le"
},
"product_reference": "libnfsidmap-1:2.3.3-68.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.3.3-68.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.s390x"
},
"product_reference": "libnfsidmap-1:2.3.3-68.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.3.3-68.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.x86_64"
},
"product_reference": "libnfsidmap-1:2.3.3-68.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686"
},
"product_reference": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le"
},
"product_reference": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x"
},
"product_reference": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64"
},
"product_reference": "libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.i686"
},
"product_reference": "libnfsidmap-devel-1:2.3.3-68.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le"
},
"product_reference": "libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.s390x"
},
"product_reference": "libnfsidmap-devel-1:2.3.3-68.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64"
},
"product_reference": "libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.3.3-68.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.aarch64"
},
"product_reference": "nfs-utils-1:2.3.3-68.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.3.3-68.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.ppc64le"
},
"product_reference": "nfs-utils-1:2.3.3-68.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.3.3-68.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.s390x"
},
"product_reference": "nfs-utils-1:2.3.3-68.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.3.3-68.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.src"
},
"product_reference": "nfs-utils-1:2.3.3-68.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.3.3-68.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.x86_64"
},
"product_reference": "nfs-utils-1:2.3.3-68.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64"
},
"product_reference": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686"
},
"product_reference": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le"
},
"product_reference": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x"
},
"product_reference": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64"
},
"product_reference": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64"
},
"product_reference": "nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.i686"
},
"product_reference": "nfs-utils-debugsource-1:2.3.3-68.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le"
},
"product_reference": "nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x"
},
"product_reference": "nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64"
},
"product_reference": "nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.3.3-68.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.aarch64"
},
"product_reference": "libnfsidmap-1:2.3.3-68.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.3.3-68.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.i686"
},
"product_reference": "libnfsidmap-1:2.3.3-68.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.3.3-68.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.ppc64le"
},
"product_reference": "libnfsidmap-1:2.3.3-68.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.3.3-68.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.s390x"
},
"product_reference": "libnfsidmap-1:2.3.3-68.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.3.3-68.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.x86_64"
},
"product_reference": "libnfsidmap-1:2.3.3-68.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686"
},
"product_reference": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le"
},
"product_reference": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x"
},
"product_reference": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64"
},
"product_reference": "libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.i686"
},
"product_reference": "libnfsidmap-devel-1:2.3.3-68.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le"
},
"product_reference": "libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.s390x"
},
"product_reference": "libnfsidmap-devel-1:2.3.3-68.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64"
},
"product_reference": "libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.3.3-68.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.aarch64"
},
"product_reference": "nfs-utils-1:2.3.3-68.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.3.3-68.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.ppc64le"
},
"product_reference": "nfs-utils-1:2.3.3-68.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.3.3-68.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.s390x"
},
"product_reference": "nfs-utils-1:2.3.3-68.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.3.3-68.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.src"
},
"product_reference": "nfs-utils-1:2.3.3-68.el8_10.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.3.3-68.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.x86_64"
},
"product_reference": "nfs-utils-1:2.3.3-68.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64"
},
"product_reference": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686"
},
"product_reference": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le"
},
"product_reference": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x"
},
"product_reference": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64"
},
"product_reference": "nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64"
},
"product_reference": "nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.i686"
},
"product_reference": "nfs-utils-debugsource-1:2.3.3-68.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le"
},
"product_reference": "nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x"
},
"product_reference": "nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64"
},
"product_reference": "nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Simon Hall"
]
}
],
"cve": "CVE-2025-12801",
"cwe": {
"id": "CWE-279",
"name": "Incorrect Execution-Assigned Permissions"
},
"discovery_date": "2025-11-06T12:15:57.744000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2413081"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any \u0027root_squash\u0027 or \u0027all_squash\u0027 attributes that would normally be expected to apply to that client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This MODERATE impact vulnerability in `rpc.mountd` within the `nfs-utils` package allows an authenticated NFSv3 client to bypass configured `root_squash` or `all_squash` restrictions. This enables the client to access subdirectories of an exported NFS share with elevated privileges, regardless of the intended file permissions. Red Hat Enterprise Linux systems configured as NFSv3 servers are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12801"
},
{
"category": "external",
"summary": "RHBZ#2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801"
}
],
"release_date": "2026-03-04T15:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T19:05:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3938"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-debuginfo-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libnfsidmap-devel-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debuginfo-1:2.3.3-68.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:nfs-utils-debugsource-1:2.3.3-68.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation"
}
]
}
RHSA-2026:5877
Vulnerability from csaf_redhat - Published: 2026-04-01 10:06 - Updated: 2026-04-01 10:07A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.19.27 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\n This release includes a security update for Red Hat OpenShift Container\nPlatform 4.19.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.19.27. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2026:5876\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/release_notes/\n\nSecurity Fix(es):\n\n* nfs-utils: rpc.mountd in the nfs-utils privilege escalation\n(CVE-2025-12801)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.\n\nAll OpenShift Container Platform 4.19 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/updating_clusters/index#updating-cluster-cli.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5877",
"url": "https://access.redhat.com/errata/RHSA-2026:5877"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5877.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.19.27 bug fix and security update",
"tracking": {
"current_release_date": "2026-04-01T10:07:32+00:00",
"generator": {
"date": "2026-04-01T10:07:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:5877",
"initial_release_date": "2026-04-01T10:06:58+00:00",
"revision_history": [
{
"date": "2026-04-01T10:06:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-01T10:06:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T10:07:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.19",
"product": {
"name": "Red Hat OpenShift Container Platform 4.19",
"product_id": "9Base-RHOSE-4.19",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.19::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-aarch64-4.19.9.6.202603251941-0",
"product": {
"name": "rhcos-aarch64-4.19.9.6.202603251941-0",
"product_id": "rhcos-aarch64-4.19.9.6.202603251941-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@4.19.9.6.202603251941?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-ppc64le-4.19.9.6.202603251941-0",
"product": {
"name": "rhcos-ppc64le-4.19.9.6.202603251941-0",
"product_id": "rhcos-ppc64le-4.19.9.6.202603251941-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@4.19.9.6.202603251941?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-s390x-4.19.9.6.202603251941-0",
"product": {
"name": "rhcos-s390x-4.19.9.6.202603251941-0",
"product_id": "rhcos-s390x-4.19.9.6.202603251941-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@4.19.9.6.202603251941?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-x86_64-4.19.9.6.202603251941-0",
"product": {
"name": "rhcos-x86_64-4.19.9.6.202603251941-0",
"product_id": "rhcos-x86_64-4.19.9.6.202603251941-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@4.19.9.6.202603251941?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-aarch64-4.19.9.6.202603251941-0 as a component of Red Hat OpenShift Container Platform 4.19",
"product_id": "9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202603251941-0"
},
"product_reference": "rhcos-aarch64-4.19.9.6.202603251941-0",
"relates_to_product_reference": "9Base-RHOSE-4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-ppc64le-4.19.9.6.202603251941-0 as a component of Red Hat OpenShift Container Platform 4.19",
"product_id": "9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202603251941-0"
},
"product_reference": "rhcos-ppc64le-4.19.9.6.202603251941-0",
"relates_to_product_reference": "9Base-RHOSE-4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-s390x-4.19.9.6.202603251941-0 as a component of Red Hat OpenShift Container Platform 4.19",
"product_id": "9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202603251941-0"
},
"product_reference": "rhcos-s390x-4.19.9.6.202603251941-0",
"relates_to_product_reference": "9Base-RHOSE-4.19"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-x86_64-4.19.9.6.202603251941-0 as a component of Red Hat OpenShift Container Platform 4.19",
"product_id": "9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202603251941-0"
},
"product_reference": "rhcos-x86_64-4.19.9.6.202603251941-0",
"relates_to_product_reference": "9Base-RHOSE-4.19"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Simon Hall"
]
}
],
"cve": "CVE-2025-12801",
"cwe": {
"id": "CWE-279",
"name": "Incorrect Execution-Assigned Permissions"
},
"discovery_date": "2025-11-06T12:15:57.744000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2413081"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any \u0027root_squash\u0027 or \u0027all_squash\u0027 attributes that would normally be expected to apply to that client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This MODERATE impact vulnerability in `rpc.mountd` within the `nfs-utils` package allows an authenticated NFSv3 client to bypass configured `root_squash` or `all_squash` restrictions. This enables the client to access subdirectories of an exported NFS share with elevated privileges, regardless of the intended file permissions. Red Hat Enterprise Linux systems configured as NFSv3 servers are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202603251941-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202603251941-0",
"9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202603251941-0",
"9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202603251941-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12801"
},
{
"category": "external",
"summary": "RHBZ#2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801"
}
],
"release_date": "2026-03-04T15:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-01T10:06:58+00:00",
"details": "For OpenShift Container Platform 4.19 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:67559510d25d5024c374d67104b99d88f83746f615fa8232ae778d9e7fec14f8\n\n (For s390x architecture)\n The image digest is sha256:2d527273c5a7077d815a2a67e7970ea3dedfe13bb4f973eaaf75fb8cc2166235\n\n (For ppc64le architecture)\n The image digest is sha256:d82500c7d65c17524bea939caf23104b28965311110305220943e131d1797b35\n\n (For aarch64 architecture)\n The image digest is sha256:434c8a014b3a5c1e936a0aab41cf907048fc6eca75e49a4e78c2b931deedb1cf\n\nAll OpenShift Container Platform 4.19 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202603251941-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202603251941-0",
"9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202603251941-0",
"9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202603251941-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5877"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202603251941-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202603251941-0",
"9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202603251941-0",
"9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202603251941-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.19:rhcos-aarch64-4.19.9.6.202603251941-0",
"9Base-RHOSE-4.19:rhcos-ppc64le-4.19.9.6.202603251941-0",
"9Base-RHOSE-4.19:rhcos-s390x-4.19.9.6.202603251941-0",
"9Base-RHOSE-4.19:rhcos-x86_64-4.19.9.6.202603251941-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation"
}
]
}
RHSA-2026:5867
Vulnerability from csaf_redhat - Published: 2026-04-01 09:17 - Updated: 2026-04-01 10:07A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.17.52 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.17.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container Platform 4.17.52. See the following advisory for the RPM packages for this release:\n\nhttps://access.redhat.com/errata/RHSA-2026:5866\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/release_notes/\n\nSecurity Fix(es):\n\n* nfs-utils: rpc.mountd in the nfs-utils privilege escalation (CVE-2025-12801)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.17 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html-single/updating_clusters/index#updating-cluster-cli.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5867",
"url": "https://access.redhat.com/errata/RHSA-2026:5867"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5867.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.17.52 bug fix and security update",
"tracking": {
"current_release_date": "2026-04-01T10:07:25+00:00",
"generator": {
"date": "2026-04-01T10:07:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:5867",
"initial_release_date": "2026-04-01T09:17:57+00:00",
"revision_history": [
{
"date": "2026-04-01T09:17:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-01T09:17:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T10:07:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.17",
"product": {
"name": "Red Hat OpenShift Container Platform 4.17",
"product_id": "9Base-RHOSE-4.17",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.17::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-aarch64-417.94.202603242359-0",
"product": {
"name": "rhcos-aarch64-417.94.202603242359-0",
"product_id": "rhcos-aarch64-417.94.202603242359-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@417.94.202603242359?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-ppc64le-417.94.202603242359-0",
"product": {
"name": "rhcos-ppc64le-417.94.202603242359-0",
"product_id": "rhcos-ppc64le-417.94.202603242359-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@417.94.202603242359?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-s390x-417.94.202603242359-0",
"product": {
"name": "rhcos-s390x-417.94.202603242359-0",
"product_id": "rhcos-s390x-417.94.202603242359-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@417.94.202603242359?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-x86_64-417.94.202603242359-0",
"product": {
"name": "rhcos-x86_64-417.94.202603242359-0",
"product_id": "rhcos-x86_64-417.94.202603242359-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@417.94.202603242359?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-aarch64-417.94.202603242359-0 as a component of Red Hat OpenShift Container Platform 4.17",
"product_id": "9Base-RHOSE-4.17:rhcos-aarch64-417.94.202603242359-0"
},
"product_reference": "rhcos-aarch64-417.94.202603242359-0",
"relates_to_product_reference": "9Base-RHOSE-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-ppc64le-417.94.202603242359-0 as a component of Red Hat OpenShift Container Platform 4.17",
"product_id": "9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202603242359-0"
},
"product_reference": "rhcos-ppc64le-417.94.202603242359-0",
"relates_to_product_reference": "9Base-RHOSE-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-s390x-417.94.202603242359-0 as a component of Red Hat OpenShift Container Platform 4.17",
"product_id": "9Base-RHOSE-4.17:rhcos-s390x-417.94.202603242359-0"
},
"product_reference": "rhcos-s390x-417.94.202603242359-0",
"relates_to_product_reference": "9Base-RHOSE-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-x86_64-417.94.202603242359-0 as a component of Red Hat OpenShift Container Platform 4.17",
"product_id": "9Base-RHOSE-4.17:rhcos-x86_64-417.94.202603242359-0"
},
"product_reference": "rhcos-x86_64-417.94.202603242359-0",
"relates_to_product_reference": "9Base-RHOSE-4.17"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Simon Hall"
]
}
],
"cve": "CVE-2025-12801",
"cwe": {
"id": "CWE-279",
"name": "Incorrect Execution-Assigned Permissions"
},
"discovery_date": "2025-11-06T12:15:57.744000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2413081"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any \u0027root_squash\u0027 or \u0027all_squash\u0027 attributes that would normally be expected to apply to that client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This MODERATE impact vulnerability in `rpc.mountd` within the `nfs-utils` package allows an authenticated NFSv3 client to bypass configured `root_squash` or `all_squash` restrictions. This enables the client to access subdirectories of an exported NFS share with elevated privileges, regardless of the intended file permissions. Red Hat Enterprise Linux systems configured as NFSv3 servers are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.17:rhcos-aarch64-417.94.202603242359-0",
"9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202603242359-0",
"9Base-RHOSE-4.17:rhcos-s390x-417.94.202603242359-0",
"9Base-RHOSE-4.17:rhcos-x86_64-417.94.202603242359-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12801"
},
{
"category": "external",
"summary": "RHBZ#2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801"
}
],
"release_date": "2026-03-04T15:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-01T09:17:57+00:00",
"details": "For OpenShift Container Platform 4.17 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:51723b1449a55cd6489cd60689b42d4c53ceb6956765ff51087fa90f806ac65d\n\n (For s390x architecture)\n The image digest is sha256:e463f5f9a9cb41a172c0fafcd34e48fcfa24f92dc4ddf7b1ab0c8ad909233d0c\n\n (For ppc64le architecture)\n The image digest is sha256:4736dafe11d3ac46f8f6126de474c7030a59e75636d023f20048c6894d783338\n\n (For aarch64 architecture)\n The image digest is sha256:b78fb9415afb4d73e22c9d8f7ec9de1729023913a11ce4c85bae1e0e71560daf\n\nAll OpenShift Container Platform 4.17 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"9Base-RHOSE-4.17:rhcos-aarch64-417.94.202603242359-0",
"9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202603242359-0",
"9Base-RHOSE-4.17:rhcos-s390x-417.94.202603242359-0",
"9Base-RHOSE-4.17:rhcos-x86_64-417.94.202603242359-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5867"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHOSE-4.17:rhcos-aarch64-417.94.202603242359-0",
"9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202603242359-0",
"9Base-RHOSE-4.17:rhcos-s390x-417.94.202603242359-0",
"9Base-RHOSE-4.17:rhcos-x86_64-417.94.202603242359-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.17:rhcos-aarch64-417.94.202603242359-0",
"9Base-RHOSE-4.17:rhcos-ppc64le-417.94.202603242359-0",
"9Base-RHOSE-4.17:rhcos-s390x-417.94.202603242359-0",
"9Base-RHOSE-4.17:rhcos-x86_64-417.94.202603242359-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation"
}
]
}
RHSA-2026:5127
Vulnerability from csaf_redhat - Published: 2026-03-25 04:59 - Updated: 2026-04-01 10:07A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.18.36 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.18.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container Platform 4.18.36. See the following advisory for the RPM packages for this release:\n\nhttps://access.redhat.com/errata/RHBA-2026:5126\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/\n\nSecurity Fix(es):\n\n* nfs-utils: rpc.mountd in the nfs-utils privilege escalation (CVE-2025-12801)\n* grub2: Missing unregister call for gettext command may lead to use-after-free (CVE-2025-61662)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.18 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html-single/updating_clusters/index#updating-cluster-cli.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5127",
"url": "https://access.redhat.com/errata/RHSA-2026:5127"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "external",
"summary": "2414683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414683"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5127.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.18.36 bug fix and security update",
"tracking": {
"current_release_date": "2026-04-01T10:07:24+00:00",
"generator": {
"date": "2026-04-01T10:07:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:5127",
"initial_release_date": "2026-03-25T04:59:06+00:00",
"revision_history": [
{
"date": "2026-03-25T04:59:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-25T04:59:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T10:07:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.18",
"product": {
"name": "Red Hat OpenShift Container Platform 4.18",
"product_id": "9Base-RHOSE-4.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.18::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-aarch64-418.94.202603181125-0",
"product": {
"name": "rhcos-aarch64-418.94.202603181125-0",
"product_id": "rhcos-aarch64-418.94.202603181125-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@418.94.202603181125?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-ppc64le-418.94.202603181125-0",
"product": {
"name": "rhcos-ppc64le-418.94.202603181125-0",
"product_id": "rhcos-ppc64le-418.94.202603181125-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@418.94.202603181125?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-s390x-418.94.202603181125-0",
"product": {
"name": "rhcos-s390x-418.94.202603181125-0",
"product_id": "rhcos-s390x-418.94.202603181125-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@418.94.202603181125?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhcos-x86_64-418.94.202603181125-0",
"product": {
"name": "rhcos-x86_64-418.94.202603181125-0",
"product_id": "rhcos-x86_64-418.94.202603181125-0",
"product_identification_helper": {
"purl": "pkg:generic/redhat/rhcos@418.94.202603181125?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-aarch64-418.94.202603181125-0 as a component of Red Hat OpenShift Container Platform 4.18",
"product_id": "9Base-RHOSE-4.18:rhcos-aarch64-418.94.202603181125-0"
},
"product_reference": "rhcos-aarch64-418.94.202603181125-0",
"relates_to_product_reference": "9Base-RHOSE-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-ppc64le-418.94.202603181125-0 as a component of Red Hat OpenShift Container Platform 4.18",
"product_id": "9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202603181125-0"
},
"product_reference": "rhcos-ppc64le-418.94.202603181125-0",
"relates_to_product_reference": "9Base-RHOSE-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-s390x-418.94.202603181125-0 as a component of Red Hat OpenShift Container Platform 4.18",
"product_id": "9Base-RHOSE-4.18:rhcos-s390x-418.94.202603181125-0"
},
"product_reference": "rhcos-s390x-418.94.202603181125-0",
"relates_to_product_reference": "9Base-RHOSE-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhcos-x86_64-418.94.202603181125-0 as a component of Red Hat OpenShift Container Platform 4.18",
"product_id": "9Base-RHOSE-4.18:rhcos-x86_64-418.94.202603181125-0"
},
"product_reference": "rhcos-x86_64-418.94.202603181125-0",
"relates_to_product_reference": "9Base-RHOSE-4.18"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Simon Hall"
]
}
],
"cve": "CVE-2025-12801",
"cwe": {
"id": "CWE-279",
"name": "Incorrect Execution-Assigned Permissions"
},
"discovery_date": "2025-11-06T12:15:57.744000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2413081"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any \u0027root_squash\u0027 or \u0027all_squash\u0027 attributes that would normally be expected to apply to that client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This MODERATE impact vulnerability in `rpc.mountd` within the `nfs-utils` package allows an authenticated NFSv3 client to bypass configured `root_squash` or `all_squash` restrictions. This enables the client to access subdirectories of an exported NFS share with elevated privileges, regardless of the intended file permissions. Red Hat Enterprise Linux systems configured as NFSv3 servers are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202603181125-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12801"
},
{
"category": "external",
"summary": "RHBZ#2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801"
}
],
"release_date": "2026-03-04T15:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-25T04:59:06+00:00",
"details": "For OpenShift Container Platform 4.18 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:7486ca2ec3bce0ee41dd2c03d75e120b6f660929ea50240463937ae1c4b118f7\n\n (For s390x architecture)\n The image digest is sha256:907e10c7c312b21ba21efa0bf9610da3d69a97173eefba4510699a86c27b4b1d\n\n (For ppc64le architecture)\n The image digest is sha256:d08e99e6ab216fda7fc09188df598ebedb315b49680d6490e9df0b42ab4d5e0a\n\n (For aarch64 architecture)\n The image digest is sha256:9e1da5b54dab49265e57f7e95a7c912f2ad0d32dc6b013def90cb045fd1510b3\n\nAll OpenShift Container Platform 4.18 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202603181125-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5127"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202603181125-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202603181125-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation"
},
{
"cve": "CVE-2025-61662",
"discovery_date": "2025-11-12T21:18:21.069000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414683"
}
],
"notes": [
{
"category": "description",
"text": "A Use-After-Free vulnerability has been discovered in GRUB\u0027s gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "grub2: Missing unregister call for gettext command may lead to use-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability has been rated as have the impact of Moderate by the Red Hat Product Security team. This decision was made based in the fact an attacker needs local or physical access to the machine, to execute the gettext command after it was unloaded. Additionally the most likely outcome from an successful attack is a Denial of Crash by leading the grub2 to crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202603181125-0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61662"
},
{
"category": "external",
"summary": "RHBZ#2414683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61662",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61662"
},
{
"category": "external",
"summary": "https://lists.gnu.org/archive/html/grub-devel/2025-11/msg00155.html",
"url": "https://lists.gnu.org/archive/html/grub-devel/2025-11/msg00155.html"
}
],
"release_date": "2025-11-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-25T04:59:06+00:00",
"details": "For OpenShift Container Platform 4.18 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:7486ca2ec3bce0ee41dd2c03d75e120b6f660929ea50240463937ae1c4b118f7\n\n (For s390x architecture)\n The image digest is sha256:907e10c7c312b21ba21efa0bf9610da3d69a97173eefba4510699a86c27b4b1d\n\n (For ppc64le architecture)\n The image digest is sha256:d08e99e6ab216fda7fc09188df598ebedb315b49680d6490e9df0b42ab4d5e0a\n\n (For aarch64 architecture)\n The image digest is sha256:9e1da5b54dab49265e57f7e95a7c912f2ad0d32dc6b013def90cb045fd1510b3\n\nAll OpenShift Container Platform 4.18 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202603181125-0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5127"
},
{
"category": "workaround",
"details": "There\u0027s no known mitigation available for this vulnerability.",
"product_ids": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202603181125-0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHOSE-4.18:rhcos-aarch64-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-ppc64le-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-s390x-418.94.202603181125-0",
"9Base-RHOSE-4.18:rhcos-x86_64-418.94.202603181125-0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "grub2: Missing unregister call for gettext command may lead to use-after-free"
}
]
}
RHSA-2026:3940
Vulnerability from csaf_redhat - Published: 2026-03-05 19:12 - Updated: 2026-04-01 10:07A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for nfs-utils is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. \n\nSecurity Fix(es):\n\n* nfs-utils: rpc.mountd in the nfs-utils privilege escalation (CVE-2025-12801)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3940",
"url": "https://access.redhat.com/errata/RHSA-2026:3940"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3940.json"
}
],
"title": "Red Hat Security Advisory: nfs-utils security update",
"tracking": {
"current_release_date": "2026-04-01T10:07:22+00:00",
"generator": {
"date": "2026-04-01T10:07:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:3940",
"initial_release_date": "2026-03-05T19:12:37+00:00",
"revision_history": [
{
"date": "2026-03-05T19:12:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-05T19:12:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T10:07:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"product": {
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"product_id": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos@2.5.4-38.el9_7.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"product": {
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"product_id": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils@2.5.4-38.el9_7.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"product": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"product_id": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.5.4-38.el9_7.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"product": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"product_id": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.5.4-38.el9_7.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"product_id": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.5.4-38.el9_7.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"product": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"product_id": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.5.4-38.el9_7.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"product_id": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.5.4-38.el9_7.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"product": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"product_id": "libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.5.4-38.el9_7.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"product": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"product_id": "nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.5.4-38.el9_7.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"product": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"product_id": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.5.4-38.el9_7.3?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"product": {
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"product_id": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos@2.5.4-38.el9_7.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"product": {
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"product_id": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils@2.5.4-38.el9_7.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"product": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"product_id": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.5.4-38.el9_7.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"product": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"product_id": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.5.4-38.el9_7.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"product_id": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.5.4-38.el9_7.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"product": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"product_id": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.5.4-38.el9_7.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"product_id": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.5.4-38.el9_7.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"product": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"product_id": "libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.5.4-38.el9_7.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"product": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"product_id": "nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.5.4-38.el9_7.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"product": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"product_id": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.5.4-38.el9_7.3?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"product": {
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"product_id": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos@2.5.4-38.el9_7.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"product": {
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"product_id": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils@2.5.4-38.el9_7.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"product": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"product_id": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.5.4-38.el9_7.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"product": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"product_id": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.5.4-38.el9_7.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"product_id": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.5.4-38.el9_7.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"product": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"product_id": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.5.4-38.el9_7.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"product_id": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.5.4-38.el9_7.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"product": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"product_id": "libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.5.4-38.el9_7.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"product": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"product_id": "nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.5.4-38.el9_7.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"product": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"product_id": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.5.4-38.el9_7.3?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"product": {
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"product_id": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos@2.5.4-38.el9_7.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"product": {
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"product_id": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils@2.5.4-38.el9_7.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"product": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"product_id": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.5.4-38.el9_7.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"product": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"product_id": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.5.4-38.el9_7.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"product_id": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.5.4-38.el9_7.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"product": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"product_id": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.5.4-38.el9_7.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"product_id": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.5.4-38.el9_7.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"product": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"product_id": "libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.5.4-38.el9_7.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"product": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"product_id": "nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.5.4-38.el9_7.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"product": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"product_id": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.5.4-38.el9_7.3?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"product": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"product_id": "libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.5.4-38.el9_7.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"product": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"product_id": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.5.4-38.el9_7.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"product": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"product_id": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.5.4-38.el9_7.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"product_id": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.5.4-38.el9_7.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"product": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"product_id": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.5.4-38.el9_7.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"product_id": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.5.4-38.el9_7.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"product": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"product_id": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.5.4-38.el9_7.3?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-1:2.5.4-38.el9_7.3.src",
"product": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.src",
"product_id": "nfs-utils-1:2.5.4-38.el9_7.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.5.4-38.el9_7.3?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.src"
},
"product_reference": "nfs-utils-1:2.5.4-38.el9_7.3.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.src"
},
"product_reference": "nfs-utils-1:2.5.4-38.el9_7.3.src",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.src"
},
"product_reference": "nfs-utils-1:2.5.4-38.el9_7.3.src",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"relates_to_product_reference": "CRB-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Simon Hall"
]
}
],
"cve": "CVE-2025-12801",
"cwe": {
"id": "CWE-279",
"name": "Incorrect Execution-Assigned Permissions"
},
"discovery_date": "2025-11-06T12:15:57.744000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2413081"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any \u0027root_squash\u0027 or \u0027all_squash\u0027 attributes that would normally be expected to apply to that client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This MODERATE impact vulnerability in `rpc.mountd` within the `nfs-utils` package allows an authenticated NFSv3 client to bypass configured `root_squash` or `all_squash` restrictions. This enables the client to access subdirectories of an exported NFS share with elevated privileges, regardless of the intended file permissions. Red Hat Enterprise Linux systems configured as NFSv3 servers are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.src",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.src",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.src",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12801"
},
{
"category": "external",
"summary": "RHBZ#2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801"
}
],
"release_date": "2026-03-04T15:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T19:12:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.src",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.src",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.src",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3940"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.src",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.src",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.src",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.src",
"AppStream-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"AppStream-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.src",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"BaseOS-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:libnfsidmap-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:libnfsidmap-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:libnfsidmap-devel-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.src",
"CRB-9.7.0.Z.MAIN:nfs-utils-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-coreos-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfs-utils-debugsource-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-1:2.5.4-38.el9_7.3.x86_64",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.aarch64",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.i686",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.ppc64le",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.s390x",
"CRB-9.7.0.Z.MAIN:nfsv4-client-utils-debuginfo-1:2.5.4-38.el9_7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation"
}
]
}
RHSA-2026:3942
Vulnerability from csaf_redhat - Published: 2026-03-06 08:05 - Updated: 2026-04-01 10:07A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for nfs-utils is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. \n\nSecurity Fix(es):\n\n* nfs-utils: rpc.mountd in the nfs-utils privilege escalation (CVE-2025-12801)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:3942",
"url": "https://access.redhat.com/errata/RHSA-2026:3942"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3942.json"
}
],
"title": "Red Hat Security Advisory: nfs-utils security update",
"tracking": {
"current_release_date": "2026-04-01T10:07:23+00:00",
"generator": {
"date": "2026-04-01T10:07:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:3942",
"initial_release_date": "2026-03-06T08:05:30+00:00",
"revision_history": [
{
"date": "2026-03-06T08:05:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-06T08:05:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T10:07:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"product": {
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"product_id": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos@2.5.4-26.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"product": {
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"product_id": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils@2.5.4-26.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"product": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"product_id": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.5.4-26.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"product": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"product_id": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.5.4-26.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"product_id": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.5.4-26.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"product": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"product_id": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.5.4-26.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"product_id": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.5.4-26.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"product": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"product_id": "libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.5.4-26.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"product": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"product_id": "nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.5.4-26.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"product": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"product_id": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.5.4-26.el9_4.3?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"product": {
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"product_id": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos@2.5.4-26.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"product": {
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"product_id": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils@2.5.4-26.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"product": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"product_id": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.5.4-26.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"product": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"product_id": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.5.4-26.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"product_id": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.5.4-26.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"product": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"product_id": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.5.4-26.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"product_id": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.5.4-26.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"product": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"product_id": "libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.5.4-26.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"product": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"product_id": "nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.5.4-26.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"product": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"product_id": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.5.4-26.el9_4.3?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"product": {
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"product_id": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos@2.5.4-26.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"product": {
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"product_id": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils@2.5.4-26.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"product": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"product_id": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.5.4-26.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"product": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"product_id": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.5.4-26.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"product_id": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.5.4-26.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"product": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"product_id": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.5.4-26.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"product_id": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.5.4-26.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"product": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"product_id": "libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.5.4-26.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"product": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"product_id": "nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.5.4-26.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"product": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"product_id": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.5.4-26.el9_4.3?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"product": {
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"product_id": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos@2.5.4-26.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"product": {
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"product_id": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils@2.5.4-26.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"product": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"product_id": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.5.4-26.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"product": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"product_id": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.5.4-26.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"product_id": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.5.4-26.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"product": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"product_id": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.5.4-26.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"product_id": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.5.4-26.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"product": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"product_id": "libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.5.4-26.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"product": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"product_id": "nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.5.4-26.el9_4.3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"product": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"product_id": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.5.4-26.el9_4.3?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"product": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"product_id": "libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap@2.5.4-26.el9_4.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"product": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"product_id": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debugsource@2.5.4-26.el9_4.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"product": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"product_id": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-debuginfo@2.5.4-26.el9_4.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"product": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"product_id": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-coreos-debuginfo@2.5.4-26.el9_4.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"product": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"product_id": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils-debuginfo@2.5.4-26.el9_4.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"product": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"product_id": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfsv4-client-utils-debuginfo@2.5.4-26.el9_4.3?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"product": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"product_id": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libnfsidmap-devel@2.5.4-26.el9_4.3?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-utils-1:2.5.4-26.el9_4.3.src",
"product": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.src",
"product_id": "nfs-utils-1:2.5.4-26.el9_4.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nfs-utils@2.5.4-26.el9_4.3?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.src"
},
"product_reference": "nfs-utils-1:2.5.4-26.el9_4.3.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.src"
},
"product_reference": "nfs-utils-1:2.5.4-26.el9_4.3.src",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.src"
},
"product_reference": "nfs-utils-1:2.5.4-26.el9_4.3.src",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.4)",
"product_id": "CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64"
},
"product_reference": "nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"relates_to_product_reference": "CRB-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Simon Hall"
]
}
],
"cve": "CVE-2025-12801",
"cwe": {
"id": "CWE-279",
"name": "Incorrect Execution-Assigned Permissions"
},
"discovery_date": "2025-11-06T12:15:57.744000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2413081"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any \u0027root_squash\u0027 or \u0027all_squash\u0027 attributes that would normally be expected to apply to that client.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This MODERATE impact vulnerability in `rpc.mountd` within the `nfs-utils` package allows an authenticated NFSv3 client to bypass configured `root_squash` or `all_squash` restrictions. This enables the client to access subdirectories of an exported NFS share with elevated privileges, regardless of the intended file permissions. Red Hat Enterprise Linux systems configured as NFSv3 servers are affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.src",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.src",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.src",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12801"
},
{
"category": "external",
"summary": "RHBZ#2413081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801"
}
],
"release_date": "2026-03-04T15:06:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-06T08:05:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.src",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.src",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.src",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:3942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.src",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.src",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.src",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.src",
"AppStream-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"AppStream-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.src",
"BaseOS-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"BaseOS-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:libnfsidmap-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:libnfsidmap-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:libnfsidmap-devel-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.src",
"CRB-9.4.0.Z.EUS:nfs-utils-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-coreos-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfs-utils-debugsource-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-1:2.5.4-26.el9_4.3.x86_64",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.aarch64",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.i686",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.ppc64le",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.s390x",
"CRB-9.4.0.Z.EUS:nfsv4-client-utils-debuginfo-1:2.5.4-26.el9_4.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nfs-utils: rpc.mountd in the nfs-utils privilege escalation"
}
]
}
CERTFR-2026-AVI-0326
Vulnerability from certfr_avis - Published: 2026-03-20 - Updated: 2026-03-20
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 6.0.26+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.3.6 | ||
| VMware | Tanzu Platform | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.6.9 | ||
| VMware | N/A | Python Buildpack versions antérieures à 1.8.83 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 3.1.9 | ||
| VMware | Tanzu Platform | Tanzu RabbitMQ sur Tanzu Platform versions antérieures à 2.4.4 | ||
| VMware | N/A | PHP Buildpack versions antérieures à 4.6.69 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 3.2.5 | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.9+LTS-T | ||
| VMware | Tanzu Platform | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.17 | ||
| VMware | Tanzu Platform | Tanzu RabbitMQ pour Tanzu Platform versions antérieures à 10.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 2.4.6 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 1.16.18 | ||
| VMware | Tanzu Platform | Tanzu for Valkey sur Tanzu Platform versions antérieures à 10.2.2 | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 6.0.26+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.9+LTS-T | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.3.6 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.26+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.6.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.83",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ sur Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.69",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.5",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.9+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.17",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.18",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for Valkey sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.26+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.9+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2022-50759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50759"
},
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2023-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3640"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2024-57875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57875"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54129"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-49543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2023-53562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53562"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2025-38042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38042"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-53829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53829"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-54002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54002"
},
{
"name": "CVE-2022-50550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50550"
},
{
"name": "CVE-2022-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0400"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2022-49359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2022-48673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48673"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2024-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39293"
},
{
"name": "CVE-2023-53008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
},
{
"name": "CVE-2025-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38669"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2024-38306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38306"
},
{
"name": "CVE-2023-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53733"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2023-1386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1386"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-52926",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
},
{
"name": "CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2026-25500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25500"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27558"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2023-53529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53529"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2025-52534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52534"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2022-50407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50407"
},
{
"name": "CVE-2026-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23196"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2024-45775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45775"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2026-23126",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23126"
},
{
"name": "CVE-2025-38329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38329"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2022-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50230"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53588"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2022-49533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2025-69645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69645"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2022-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2023-52561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52561"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2026-24734",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24734"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2022-50815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50815"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38036"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2025-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2024-56665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56665"
},
{
"name": "CVE-2025-38340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38340"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-53629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53629"
},
{
"name": "CVE-2022-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50178"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2025-37880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2026-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23217"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2025-21656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21656"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2025-69650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69650"
},
{
"name": "CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2025-38207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38207"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49742"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2024-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52560"
},
{
"name": "CVE-2024-56604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2025-69647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69647"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2022-49108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49108"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2025-38717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38717"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2026-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2219"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2022-50627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50627"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38029"
},
{
"name": "CVE-2022-49123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38096"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2022-50380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50380"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2022-48990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48990"
},
{
"name": "CVE-2024-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24864"
},
{
"name": "CVE-2024-35832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35832"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2024-45782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45782"
},
{
"name": "CVE-2022-50785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50785"
},
{
"name": "CVE-2025-39745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39745"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-71223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71223"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2025-21752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21752"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-39282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39282"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-46316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46316"
},
{
"name": "CVE-2024-47866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47866"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2022-48667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48667"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-49161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49161"
},
{
"name": "CVE-2021-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21240"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2023-52485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52485"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2022-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49997"
},
{
"name": "CVE-2022-49469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49469"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0480"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1272"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2022-49651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49651"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2024-26770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26770"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2024-27041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27041"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2026-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3195"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26242"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2022-48668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48668"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2025-14177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14177"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2022-50322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50322"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-27635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27635"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2026-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2391"
},
{
"name": "CVE-2021-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4095"
},
{
"name": "CVE-2022-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50240"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71074"
},
{
"name": "CVE-2025-38673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38673"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2018-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1121"
},
{
"name": "CVE-2022-49547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49547"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2025-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0622"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-26757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26757"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2022-49484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2024-56788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56788"
},
{
"name": "CVE-2016-8660",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8660"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7519"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2022-50811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50811"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2023-53366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53366"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2022-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
},
{
"name": "CVE-2024-40918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40918"
},
{
"name": "CVE-2024-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27032"
},
{
"name": "CVE-2022-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50236"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2026-23137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23137"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-37882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2026-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3731"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2024-43844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43844"
},
{
"name": "CVE-2023-52920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-69652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69652"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38353"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2023-52761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52761"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2023-53609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53609"
},
{
"name": "CVE-2023-53478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53478"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2023-53682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53682"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2026-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3442"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2022-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2020-35501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35501"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-52624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52624"
},
{
"name": "CVE-2024-56557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53198"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-38082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38082"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2023-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4969"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53789"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2024-8612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8612"
},
{
"name": "CVE-2023-52586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52586"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2025-37834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2019-19378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19378"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2021-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31615"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49932"
},
{
"name": "CVE-2022-25837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25837"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2023-52831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2022-44034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44034"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53072"
},
{
"name": "CVE-2023-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2007"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2025-69648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69648"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-53602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53602"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2023-53867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53867"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2025-38038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38038"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2023-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33053"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38261"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-69644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69644"
},
{
"name": "CVE-2022-49303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49303"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-11961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11961"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2023-52916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52916"
},
{
"name": "CVE-2025-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38064"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2022-50628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50628"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2025-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
},
{
"name": "CVE-2022-50721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50721"
},
{
"name": "CVE-2022-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50095"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2026-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3196"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2022-50479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50479"
},
{
"name": "CVE-2022-50583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50583"
},
{
"name": "CVE-2025-37806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2023-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0030"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2024-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
},
{
"name": "CVE-2024-57945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57945"
},
{
"name": "CVE-2023-54233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54233"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-49534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-53010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-57888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57888"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2023-54237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54237"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-27111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27111"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2019-19814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19814"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2026-1703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1703"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2022-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
},
{
"name": "CVE-2015-8553",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8553"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2025-21751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21751"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2025-23162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2017-13694",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13694"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2013-7445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7445"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2023-52701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52701"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2022-49317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49317"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2018-12928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12928"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-56607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56607"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2023-53671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53671"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2023-29942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29942"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2022-48633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48633"
},
{
"name": "CVE-2022-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3238"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2023-53584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53584"
},
{
"name": "CVE-2024-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57809"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-53460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53460"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2024-56671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56671"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2022-49562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2023-53483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53483"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-37746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
},
{
"name": "CVE-2022-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38076"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2024-56368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-49172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49172"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38069"
},
{
"name": "CVE-2022-49750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49750"
},
{
"name": "CVE-2023-53707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53707"
},
{
"name": "CVE-2023-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53115"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2022-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48646"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-58012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2022-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48887"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2023-45929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45929"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-37855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-32249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32249"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-38330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38330"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2017-13693",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13693"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2022-49306",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2025-36423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36423"
},
{
"name": "CVE-2022-49622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49622"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2022-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50284"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2024-27035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27035"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-25836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25836"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-29934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29934"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-38438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38438"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-1193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1193"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2025-68779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68779"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-21819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
},
{
"name": "CVE-2025-48514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48514"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2026-25749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25749"
},
{
"name": "CVE-2024-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49504"
},
{
"name": "CVE-2025-38118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2022-50500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50500"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2026-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26958"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2022-49178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2022-49173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49173"
},
{
"name": "CVE-2024-45781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45781"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2026-26269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26269"
},
{
"name": "CVE-2024-43872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43872"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2023-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-69649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69649"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2022-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49766"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
},
{
"name": "CVE-2024-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49569"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2024-56609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
},
{
"name": "CVE-2022-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49940"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2024-56611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56611"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2020-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25743"
},
{
"name": "CVE-2022-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50167"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2026-27704",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27704"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2021-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3735"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2022-50634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50634"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54514"
},
{
"name": "CVE-2025-71202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71202"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2025-0677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0677"
},
{
"name": "CVE-2024-45780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45780"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2022-50492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50492"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-59691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59691"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2023-52481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52481"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1788"
},
{
"name": "CVE-2023-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53721"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-37907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37907"
},
{
"name": "CVE-2024-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38625"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2023-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4010"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2023-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54105"
},
{
"name": "CVE-2018-17977",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17977"
},
{
"name": "CVE-2019-1010204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010204"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2023-53434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53434"
},
{
"name": "CVE-2023-29935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29935"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2018-12930",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12930"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-40012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40012"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2024-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47141"
},
{
"name": "CVE-2024-8354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8354"
},
{
"name": "CVE-2023-54323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54323"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0689"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31347"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2023-53657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53657"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2023-52732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52732"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2022-49167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49167"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2025-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0690"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2022-49234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49234"
},
{
"name": "CVE-2022-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50163"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-26699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26699"
},
{
"name": "CVE-2024-57876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31648"
},
{
"name": "CVE-2025-0678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0678"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2026-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1002"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2022-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50166"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2024-56738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56738"
},
{
"name": "CVE-2022-50778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50778"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-71203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71203"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2025-39789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39789"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2024-56583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56583"
},
{
"name": "CVE-2022-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50195"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-56712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56712"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-52634",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52634"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2025-62526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62526"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2024-45776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45776"
},
{
"name": "CVE-2022-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50090"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2020-14356",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14356"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-53764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53764"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-38672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38672"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0684"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38272"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2019-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20794"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2022-4543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4543"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2023-53627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53627"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38091"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2023-53575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53575"
},
{
"name": "CVE-2022-49516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2022-3523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3523"
},
{
"name": "CVE-2026-26157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26157"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-22072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2023-53037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53037"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2025-69646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69646"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23215"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2022-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49955"
},
{
"name": "CVE-2023-53628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53628"
},
{
"name": "CVE-2025-29943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29943"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-38140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38140"
},
{
"name": "CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39908"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2026-23118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23118"
},
{
"name": "CVE-2025-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34034"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-59692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59692"
},
{
"name": "CVE-2022-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50116"
},
{
"name": "CVE-2018-12931",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12931"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2022-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50224"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13791"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-49990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49990"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24240"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2022-50552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50552"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2023-53376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53376"
},
{
"name": "CVE-2023-53538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53538"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2017-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13165"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2023-53635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53635"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-23132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2022-49531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49531"
},
{
"name": "CVE-2022-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2022-50332",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50332"
},
{
"name": "CVE-2023-53822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53822"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2022-50461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50461"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2025-38486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38486"
},
{
"name": "CVE-2021-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26934"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2022-49528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49528"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2022-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49967"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2022-49245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49245"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2023-52682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52682"
},
{
"name": "CVE-2022-50871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50871"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2025-39958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39958"
},
{
"name": "CVE-2018-8956",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8956"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40964"
},
{
"name": "CVE-2025-69873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69873"
},
{
"name": "CVE-2026-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3441"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2022-50746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50746"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-53596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53596"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2023-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3397"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2024-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26672"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2026-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26158"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-38168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38168"
},
{
"name": "CVE-2023-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53547"
},
{
"name": "CVE-2019-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20426"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-56584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56584"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50212"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2023-54259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54259"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2025-1369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1369"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2022-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2961"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2025-14180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14180"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2024-57899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57899"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2025-38674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38674"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-45777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45777"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2024-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0564"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2022-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49961"
},
{
"name": "CVE-2025-69651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69651"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2025-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0033"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2025-25184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25184"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-52625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52625"
},
{
"name": "CVE-2023-53353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53353"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2023-53702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53702"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2023-54059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54059"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2022-50571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50571"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2022-49393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49393"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-71204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71204"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2025-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1118"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2023-53355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53355"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23181"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2023-53558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53558"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-22860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22860"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2025-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0686"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2024-45778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45778"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2023-54151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54151"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2022-36351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36351"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2026-25639",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25639"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-26658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26658"
},
{
"name": "CVE-2026-2243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2243"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2025-8746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8746"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-45779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45779"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-57857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57857"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50213"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2025-71227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71227"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2024-7883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7883"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2022-50772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50772"
},
{
"name": "CVE-2024-56717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56717"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-45885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45885"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2025-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47153"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2024-26869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2021-20255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20255"
},
{
"name": "CVE-2022-48979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48979"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2023-54180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54180"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2021-0308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0308"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2023-45927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45927"
},
{
"name": "CVE-2020-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25742"
},
{
"name": "CVE-2022-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0987"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38199"
},
{
"name": "CVE-2025-39905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39905"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2022-50720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50720"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2022-49529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2024-26876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26876"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2025-37876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
},
{
"name": "CVE-2024-58089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58089"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2022-49127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49127"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2020-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25741"
},
{
"name": "CVE-2022-50748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50748"
},
{
"name": "CVE-2023-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53767"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2023-53620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53620"
},
{
"name": "CVE-2022-50539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50539"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2022-49496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49496"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2024-56782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56782"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2023-53540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53540"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2023-54187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54187"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2025-13735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13735"
},
{
"name": "CVE-2023-53694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53694"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-56660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56660"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2025-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38033"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2024-56737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56737"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2020-11935",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11935"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
},
{
"name": "CVE-2025-71158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71158"
},
{
"name": "CVE-2022-49803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49803"
},
{
"name": "CVE-2024-57898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57898"
},
{
"name": "CVE-2020-35503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35503"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-56639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56639"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-53002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2025-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39884"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2024-35826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2022-49764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49764"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-21651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21651"
},
{
"name": "CVE-2025-38092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38092"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-37776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6519"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2022-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50009"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-37877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
},
{
"name": "CVE-2024-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2193"
},
{
"name": "CVE-2025-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4382"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-22038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2026-27141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27141"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-50518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50518"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2016-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2568"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2018-12929",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12929"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2024-45783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45783"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-53410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53410"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2022-49177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2024-58241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58241"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2022-49833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49833"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1125"
},
{
"name": "CVE-2023-53647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53647"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0012"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2022-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3872"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2025-27610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27610"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2023-53561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53561"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2020-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0256"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2025-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21634"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2025-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38047"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2017-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0537"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-26112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26112"
},
{
"name": "CVE-2018-6952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6952"
},
{
"name": "CVE-2020-14304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14304"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2026-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24001"
},
{
"name": "CVE-2025-37807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"name": "CVE-2025-29481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29481"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2024-25740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25740"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-14178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14178"
},
{
"name": "CVE-2024-57950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57950"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2022-48998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48998"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49974"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2019-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20633"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2021-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3714"
},
{
"name": "CVE-2023-54071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54071"
},
{
"name": "CVE-2024-56566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56566"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-56591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56591"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2024-57976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57976"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0685"
},
{
"name": "CVE-2024-57893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2022-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50071"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2024-56180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56180"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2021-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3864"
},
{
"name": "CVE-2025-39771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39771"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26648"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2020-24352",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24352"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2022-49296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2024-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0217"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2021-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47658"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2025-4575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
},
{
"name": "CVE-2019-12067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12067"
},
{
"name": "CVE-2024-57843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57843"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2024-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48875"
},
{
"name": "CVE-2024-41935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41935"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53382"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2023-53651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53651"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2022-50383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50383"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-53387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53387"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2024-45774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45774"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2022-50863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50863"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-39762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39762"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-52576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52576"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-57887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57887"
},
{
"name": "CVE-2025-21730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21730"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-22127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38689"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2025-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38070"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-62525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62525"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"name": "CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-38189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38189"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2021-44534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44534"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2024-56565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56565"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2024-57872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57872"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2024-46833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46833"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2023-53742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53742"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38041"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2024-56588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2022-50616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50616"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2023-53544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53544"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2022-50708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50708"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
},
{
"name": "CVE-2025-9301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9301"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2026-03-20T00:00:00",
"last_revision_date": "2026-03-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0326",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37233",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37233"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37237",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37237"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37236",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37236"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37246",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37246"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37235",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37235"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37229",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37229"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37226",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37226"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37230",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37230"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37242",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37242"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37228",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37228"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37240",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37240"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37243",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37243"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37234",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37234"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37231",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37231"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37239",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37239"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37227",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37227"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37232",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37232"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37247",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37247"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37241",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37241"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37238",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37238"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37244",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37244"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37245",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37245"
}
]
}
CERTFR-2026-AVI-0316
Vulnerability from certfr_avis - Published: 2026-03-19 - Updated: 2026-03-19
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | NodeJS Buildpack versions antérieures à 1.8.82 | ||
| VMware | Tanzu Platform | Tanzu for MySQL sur Tanzu Platform versions antérieures à 10.1.1 | ||
| VMware | N/A | Java Buildpack versions antérieures à 4.90.0 | ||
| VMware | N/A | NGINX Buildpack versions antérieures à 1.2.71 | ||
| VMware | N/A | HWC Buildpack versions antérieures à 3.1.91 | ||
| VMware | Tanzu Platform | Foundation Core for VMware Tanzu Platform versions antérieures à 3.1.9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.82",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.90.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NGINX Buildpack versions ant\u00e9rieures \u00e0 1.2.71",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "HWC Buildpack versions ant\u00e9rieures \u00e0 3.1.91",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2022-50759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50759"
},
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2023-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3640"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2024-57875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57875"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54129"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-49543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2023-53562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53562"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2025-38042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38042"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-53829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53829"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-54002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54002"
},
{
"name": "CVE-2022-50550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50550"
},
{
"name": "CVE-2022-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0400"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2022-49359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2022-48673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48673"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2024-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39293"
},
{
"name": "CVE-2023-53008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
},
{
"name": "CVE-2025-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38669"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2024-38306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38306"
},
{
"name": "CVE-2023-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53733"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2023-1386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1386"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-52926",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
},
{
"name": "CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2026-25500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25500"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27558"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2023-53529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53529"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2025-52534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52534"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2022-50407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50407"
},
{
"name": "CVE-2026-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23196"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2024-45775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45775"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2026-23126",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23126"
},
{
"name": "CVE-2025-38329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38329"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2022-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50230"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53588"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2022-49533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2025-69645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69645"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2022-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2023-52561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52561"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2022-50815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50815"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38036"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2025-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2024-56665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56665"
},
{
"name": "CVE-2025-38340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38340"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-53629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53629"
},
{
"name": "CVE-2022-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50178"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2025-37880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2026-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23217"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2025-21656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21656"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2025-69650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69650"
},
{
"name": "CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2025-38207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38207"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49742"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2024-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52560"
},
{
"name": "CVE-2024-56604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2025-69647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69647"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2022-49108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49108"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2025-38717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38717"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2026-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2219"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2022-50627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50627"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38029"
},
{
"name": "CVE-2022-49123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38096"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2022-50380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50380"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2022-48990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48990"
},
{
"name": "CVE-2024-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24864"
},
{
"name": "CVE-2024-35832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35832"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2024-45782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45782"
},
{
"name": "CVE-2022-50785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50785"
},
{
"name": "CVE-2025-39745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39745"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-71223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71223"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2025-21752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21752"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-39282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39282"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-46316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46316"
},
{
"name": "CVE-2024-47866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47866"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2022-48667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48667"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-49161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49161"
},
{
"name": "CVE-2021-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21240"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2023-52485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52485"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2022-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49997"
},
{
"name": "CVE-2022-49469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49469"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0480"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1272"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2022-49651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49651"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2024-26770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26770"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2024-27041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27041"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2026-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3195"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26242"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2022-48668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48668"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2022-50322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50322"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-27635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27635"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2021-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4095"
},
{
"name": "CVE-2022-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50240"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71074"
},
{
"name": "CVE-2025-38673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38673"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2018-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1121"
},
{
"name": "CVE-2022-49547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49547"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2025-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0622"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-26757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26757"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2022-49484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2024-56788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56788"
},
{
"name": "CVE-2016-8660",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8660"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7519"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2022-50811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50811"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2023-53366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53366"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2022-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
},
{
"name": "CVE-2024-40918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40918"
},
{
"name": "CVE-2024-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27032"
},
{
"name": "CVE-2022-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50236"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2026-23137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23137"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-37882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2026-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3731"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2024-43844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43844"
},
{
"name": "CVE-2023-52920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-69652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69652"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38353"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2023-52761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52761"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2023-53609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53609"
},
{
"name": "CVE-2023-53478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53478"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2023-53682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53682"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2026-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3442"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-47908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47908"
},
{
"name": "CVE-2022-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2020-35501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35501"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-52624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52624"
},
{
"name": "CVE-2024-56557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53198"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-38082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38082"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2023-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4969"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53789"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2024-8612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8612"
},
{
"name": "CVE-2023-52586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52586"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2025-37834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2019-19378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19378"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2021-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31615"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49932"
},
{
"name": "CVE-2022-25837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25837"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2023-52831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2022-44034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44034"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53072"
},
{
"name": "CVE-2023-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2007"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2025-69648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69648"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2023-53602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53602"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2023-53867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53867"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2025-38038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38038"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2023-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33053"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38261"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-69644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69644"
},
{
"name": "CVE-2022-49303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49303"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-11961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11961"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2023-52916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52916"
},
{
"name": "CVE-2025-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38064"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2022-50628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50628"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2025-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
},
{
"name": "CVE-2022-50721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50721"
},
{
"name": "CVE-2022-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50095"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2026-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3196"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2022-50479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50479"
},
{
"name": "CVE-2022-50583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50583"
},
{
"name": "CVE-2025-37806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2023-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0030"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2024-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
},
{
"name": "CVE-2024-57945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57945"
},
{
"name": "CVE-2023-54233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54233"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-49534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-53010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-57888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57888"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2023-54237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54237"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2019-19814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19814"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2022-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
},
{
"name": "CVE-2015-8553",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8553"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2025-21751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21751"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2025-23162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2017-13694",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13694"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2013-7445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7445"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2023-52701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52701"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2022-49317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49317"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2018-12928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12928"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-56607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56607"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2023-53671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53671"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2023-29942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29942"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2022-48633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48633"
},
{
"name": "CVE-2022-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3238"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2023-53584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53584"
},
{
"name": "CVE-2024-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57809"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-53460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53460"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2024-56671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56671"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2022-49562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2023-53483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53483"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-37746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
},
{
"name": "CVE-2022-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38076"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2024-56368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-49172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49172"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38069"
},
{
"name": "CVE-2022-49750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49750"
},
{
"name": "CVE-2023-53707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53707"
},
{
"name": "CVE-2023-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53115"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2022-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48646"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-58012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2022-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48887"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2023-45929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45929"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-37855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-32249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32249"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-38330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38330"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2017-13693",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13693"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2022-49306",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2025-36423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36423"
},
{
"name": "CVE-2022-49622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49622"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2022-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50284"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2024-27035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27035"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-25836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25836"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-29934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29934"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-38438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38438"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-1193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1193"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2025-68779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68779"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-21819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
},
{
"name": "CVE-2025-48514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48514"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2026-25749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25749"
},
{
"name": "CVE-2024-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49504"
},
{
"name": "CVE-2025-38118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2022-50500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50500"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2022-49178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2022-49173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49173"
},
{
"name": "CVE-2024-45781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45781"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2026-26269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26269"
},
{
"name": "CVE-2024-43872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43872"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2023-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-69649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69649"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2022-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49766"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
},
{
"name": "CVE-2024-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49569"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2024-56609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
},
{
"name": "CVE-2022-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49940"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2024-56611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56611"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2020-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25743"
},
{
"name": "CVE-2022-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50167"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2026-27704",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27704"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2021-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3735"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2022-50634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50634"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54514"
},
{
"name": "CVE-2025-71202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71202"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2025-0677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0677"
},
{
"name": "CVE-2024-45780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45780"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2022-50492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50492"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-59691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59691"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2023-52481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52481"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1788"
},
{
"name": "CVE-2023-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53721"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-37907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37907"
},
{
"name": "CVE-2024-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38625"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2023-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4010"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2023-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54105"
},
{
"name": "CVE-2018-17977",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17977"
},
{
"name": "CVE-2019-1010204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010204"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2023-53434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53434"
},
{
"name": "CVE-2023-29935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29935"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2018-12930",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12930"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-40012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40012"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2024-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47141"
},
{
"name": "CVE-2024-8354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8354"
},
{
"name": "CVE-2023-54323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54323"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0689"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31347"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2023-53657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53657"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2023-52732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52732"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2022-49167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49167"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2025-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0690"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2022-49234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49234"
},
{
"name": "CVE-2022-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50163"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-26699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26699"
},
{
"name": "CVE-2024-57876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31648"
},
{
"name": "CVE-2026-1229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1229"
},
{
"name": "CVE-2025-0678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0678"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2022-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50166"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2024-56738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56738"
},
{
"name": "CVE-2022-50778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50778"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-71203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71203"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2025-39789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39789"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2024-56583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56583"
},
{
"name": "CVE-2022-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50195"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-56712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56712"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-52634",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52634"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2025-62526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62526"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-45776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45776"
},
{
"name": "CVE-2022-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50090"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2020-14356",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14356"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-53764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53764"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-38672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38672"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0684"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38272"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2019-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20794"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2022-4543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4543"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2023-53627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53627"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38091"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2023-53575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53575"
},
{
"name": "CVE-2022-49516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2022-3523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3523"
},
{
"name": "CVE-2026-26157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26157"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-22072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2023-53037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53037"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2025-69646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69646"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23215"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2022-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49955"
},
{
"name": "CVE-2023-53628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53628"
},
{
"name": "CVE-2025-29943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29943"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-38140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38140"
},
{
"name": "CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39908"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2026-23118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23118"
},
{
"name": "CVE-2025-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34034"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-59692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59692"
},
{
"name": "CVE-2022-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50116"
},
{
"name": "CVE-2018-12931",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12931"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2022-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50224"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13791"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-49990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49990"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24240"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2022-50552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50552"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2023-53376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53376"
},
{
"name": "CVE-2023-53538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53538"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2017-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13165"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2023-53635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53635"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-23132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2022-49531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49531"
},
{
"name": "CVE-2022-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2022-50332",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50332"
},
{
"name": "CVE-2023-53822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53822"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2022-50461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50461"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2025-38486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38486"
},
{
"name": "CVE-2021-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26934"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2022-49528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49528"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2022-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49967"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2022-49245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49245"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2023-52682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52682"
},
{
"name": "CVE-2022-50871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50871"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2025-39958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39958"
},
{
"name": "CVE-2018-8956",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8956"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40964"
},
{
"name": "CVE-2026-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3441"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2022-50746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50746"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-53596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53596"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2023-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3397"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2024-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26672"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2026-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26158"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-38168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38168"
},
{
"name": "CVE-2023-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53547"
},
{
"name": "CVE-2019-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20426"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-56584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56584"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50212"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2023-54259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54259"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2025-1369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1369"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2022-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2961"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2024-57899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57899"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2025-38674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38674"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-45777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45777"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2024-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0564"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2022-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49961"
},
{
"name": "CVE-2025-69651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69651"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2025-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0033"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-52625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52625"
},
{
"name": "CVE-2023-53353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53353"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2023-53702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53702"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2023-54059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54059"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2022-50571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50571"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2022-49393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49393"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-71204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71204"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2025-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1118"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2023-53355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53355"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23181"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2023-53558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53558"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-22860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22860"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2025-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0686"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2024-45778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45778"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2023-54151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54151"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2022-36351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36351"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-26658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26658"
},
{
"name": "CVE-2026-2243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2243"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2025-8746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8746"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-45779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45779"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-57857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57857"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50213"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2025-71227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71227"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2024-7883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7883"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2022-50772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50772"
},
{
"name": "CVE-2024-56717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56717"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-45885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45885"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2025-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47153"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2024-26869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2021-20255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20255"
},
{
"name": "CVE-2022-48979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48979"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2023-54180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54180"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2021-0308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0308"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2023-45927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45927"
},
{
"name": "CVE-2020-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25742"
},
{
"name": "CVE-2022-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0987"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38199"
},
{
"name": "CVE-2025-39905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39905"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2022-50720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50720"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2022-49529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2024-26876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26876"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2025-37876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
},
{
"name": "CVE-2024-58089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58089"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2022-49127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49127"
},
{
"name": "CVE-2020-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25741"
},
{
"name": "CVE-2022-50748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50748"
},
{
"name": "CVE-2023-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53767"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2023-53620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53620"
},
{
"name": "CVE-2022-50539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50539"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2022-49496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49496"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2024-56782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56782"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2023-53540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53540"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2023-54187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54187"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2025-13735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13735"
},
{
"name": "CVE-2023-53694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53694"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-56660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56660"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2025-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38033"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2024-56737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56737"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2020-11935",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11935"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
},
{
"name": "CVE-2025-71158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71158"
},
{
"name": "CVE-2022-49803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49803"
},
{
"name": "CVE-2024-57898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57898"
},
{
"name": "CVE-2020-35503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35503"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-56639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56639"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-53002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2025-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39884"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2024-35826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2022-49764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49764"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-21651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21651"
},
{
"name": "CVE-2025-38092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38092"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-37776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6519"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2022-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50009"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-37877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
},
{
"name": "CVE-2024-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2193"
},
{
"name": "CVE-2025-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4382"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-22038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-50518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50518"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2016-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2568"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2018-12929",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12929"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2024-45783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45783"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-53410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53410"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2022-49177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2024-58241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58241"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2022-49833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49833"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1125"
},
{
"name": "CVE-2023-53647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53647"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0012"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2022-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3872"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2023-53561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53561"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2020-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0256"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2025-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21634"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2025-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38047"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2017-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0537"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-26112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26112"
},
{
"name": "CVE-2018-6952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6952"
},
{
"name": "CVE-2020-14304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14304"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2026-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24001"
},
{
"name": "CVE-2025-37807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"name": "CVE-2025-29481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29481"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2024-25740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25740"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-57950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57950"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2022-48998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48998"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49974"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2019-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20633"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2021-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3714"
},
{
"name": "CVE-2023-54071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54071"
},
{
"name": "CVE-2024-56566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56566"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-56591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56591"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2024-57976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57976"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0685"
},
{
"name": "CVE-2024-57893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2022-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50071"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2024-56180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56180"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2021-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3864"
},
{
"name": "CVE-2025-39771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39771"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26648"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2020-24352",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24352"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2022-49296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2024-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0217"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2021-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47658"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2019-12067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12067"
},
{
"name": "CVE-2024-57843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57843"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2024-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48875"
},
{
"name": "CVE-2024-41935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41935"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53382"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2023-53651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53651"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2022-50383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50383"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-53387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53387"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2024-45774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45774"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2022-50863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50863"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-39762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39762"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-52576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52576"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-57887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57887"
},
{
"name": "CVE-2025-21730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21730"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-22127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38689"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2025-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38070"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-62525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62525"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"name": "CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-38189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38189"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2021-44534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44534"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2024-56565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56565"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2024-57872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57872"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2024-46833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46833"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2023-53742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53742"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38041"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2024-56588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2022-50616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50616"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2023-53544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53544"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2022-50708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50708"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
},
{
"name": "CVE-2025-9301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9301"
}
],
"initial_release_date": "2026-03-19T00:00:00",
"last_revision_date": "2026-03-19T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0316",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37219",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37219"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37211",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37211"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37215",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37215"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37218",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37218"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37220",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37220"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37216",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37216"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37221",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37221"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37213",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37213"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37217",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37217"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37212",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37212"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37214",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37214"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37222",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37222"
}
]
}
alsa-2026:3939
Vulnerability from osv_almalinux
The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs.
Security Fix(es):
- nfs-utils: rpc.mountd in the nfs-utils privilege escalation (CVE-2025-12801)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "libnfsidmap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:2.8.3-0.el10_1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "libnfsidmap-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:2.8.3-0.el10_1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "nfs-utils"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:2.8.3-0.el10_1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "nfs-utils-coreos"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:2.8.3-0.el10_1.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "nfsv4-client-utils"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:2.8.3-0.el10_1.3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. \n\nSecurity Fix(es): \n\n * nfs-utils: rpc.mountd in the nfs-utils privilege escalation (CVE-2025-12801)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:3939",
"modified": "2026-03-11T09:35:33Z",
"published": "2026-03-05T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:3939"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-12801"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2413081"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/10/ALSA-2026-3939.html"
}
],
"related": [
"CVE-2025-12801"
],
"summary": "Moderate: nfs-utils security update"
}
alsa-2026:3938
Vulnerability from osv_almalinux
The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs.
Security Fix(es):
- nfs-utils: rpc.mountd in the nfs-utils privilege escalation (CVE-2025-12801)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libnfsidmap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:2.3.3-68.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libnfsidmap-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:2.3.3-68.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "nfs-utils"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:2.3.3-68.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. \n\nSecurity Fix(es): \n\n * nfs-utils: rpc.mountd in the nfs-utils privilege escalation (CVE-2025-12801)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:3938",
"modified": "2026-03-10T01:58:47Z",
"published": "2026-03-05T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:3938"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-12801"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2413081"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2026-3938.html"
}
],
"related": [
"CVE-2025-12801"
],
"summary": "Moderate: nfs-utils security update"
}
alsa-2026:3940
Vulnerability from osv_almalinux
The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs.
Security Fix(es):
- nfs-utils: rpc.mountd in the nfs-utils privilege escalation (CVE-2025-12801)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "libnfsidmap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:2.5.4-38.el9_7.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "libnfsidmap-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:2.5.4-38.el9_7.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nfs-utils"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:2.5.4-38.el9_7.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nfs-utils-coreos"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:2.5.4-38.el9_7.3"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "nfsv4-client-utils"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:2.5.4-38.el9_7.3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. \n\nSecurity Fix(es): \n\n * nfs-utils: rpc.mountd in the nfs-utils privilege escalation (CVE-2025-12801)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:3940",
"modified": "2026-03-13T09:30:09Z",
"published": "2026-03-05T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:3940"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-12801"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2413081"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2026-3940.html"
}
],
"related": [
"CVE-2025-12801"
],
"summary": "Moderate: nfs-utils security update"
}
FKIE_CVE-2025-12801
Vulnerability from fkie_nvd - Published: 2026-03-04 16:16 - Updated: 2026-03-25 05:16| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:3938 | Third Party Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:3939 | Third Party Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:3940 | Third Party Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:3941 | Third Party Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:3942 | Third Party Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:5127 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:5606 | ||
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2025-12801 | Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2413081 | Issue Tracking, Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| redhat | openshift_container_platform | 4.0 | |
| redhat | enterprise_linux | 6.0 | |
| redhat | enterprise_linux | 7.0 | |
| redhat | enterprise_linux | 8.0 | |
| redhat | enterprise_linux | 9.0 | |
| redhat | enterprise_linux | 10.0 | |
| linux-nfs | nfs-utils | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "932D137F-528B-4526-9A89-CD59FA1AB0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D65C2163-CFC2-4ABB-8F4E-CB09CEBD006C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linux-nfs:nfs-utils:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FD2E9BF-0932-4362-923C-BC98473536C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any \u0027root_squash\u0027 or \u0027all_squash\u0027 attributes that would normally be expected to apply to that client."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue descubierta recientemente en el demonio rpc.mountd del paquete nfs-utils para Linux, que permite a un cliente NFSv3 escalar los privilegios asignados a \u00e9l en el archivo /etc/exports en el momento del montaje. En particular, permite al cliente acceder a cualquier subdirectorio o sub\u00e1rbol de un directorio exportado, independientemente de los permisos de archivo establecidos, e independientemente de cualquier atributo \u0027root_squash\u0027 o \u0027all_squash\u0027 que normalmente se esperar\u00eda que se aplicaran a ese cliente."
}
],
"id": "CVE-2025-12801",
"lastModified": "2026-03-25T05:16:24.423",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2026-03-04T16:16:23.900",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3938"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3939"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3940"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3941"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2026:3942"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:5127"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-12801"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-279"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-732"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-Q8X7-J9X6-2FPC
Vulnerability from github – Published: 2026-03-04 18:31 – Updated: 2026-03-25 06:30A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
{
"affected": [],
"aliases": [
"CVE-2025-12801"
],
"database_specific": {
"cwe_ids": [
"CWE-279",
"CWE-732"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-03-04T16:16:23Z",
"severity": "MODERATE"
},
"details": "A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the\nprivileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any \u0027root_squash\u0027 or \u0027all_squash\u0027 attributes that would normally be expected to apply to that client.",
"id": "GHSA-q8x7-j9x6-2fpc",
"modified": "2026-03-25T06:30:28Z",
"published": "2026-03-04T18:31:52Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12801"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:3938"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:3939"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:3940"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:3941"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:3942"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:5127"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:5606"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-12801"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413081"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2026-0615
Vulnerability from csaf_certbund - Published: 2026-03-05 23:00 - Updated: 2026-03-08 23:00| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux ausnutzen, um Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0615 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0615.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0615 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0615"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2026-03-05",
"url": "https://access.redhat.com/errata/RHSA-2026:3938"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2026-03-05",
"url": "https://access.redhat.com/errata/RHSA-2026:3939"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2026-03-05",
"url": "https://access.redhat.com/errata/RHSA-2026:3940"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2026-03-05",
"url": "https://access.redhat.com/errata/RHSA-2026:3941"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2026-03-05",
"url": "https://access.redhat.com/errata/RHSA-2026:3942"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3940 vom 2026-03-06",
"url": "https://linux.oracle.com/errata/ELSA-2026-3940.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3939 vom 2026-03-06",
"url": "https://linux.oracle.com/errata/ELSA-2026-3939.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3938 vom 2026-03-06",
"url": "https://linux.oracle.com/errata/ELSA-2026-3938.html"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux (nfs-utils): Schwachstelle erm\u00f6glicht Offenlegung von Informationen",
"tracking": {
"current_release_date": "2026-03-08T23:00:00.000+00:00",
"generator": {
"date": "2026-03-09T08:11:49.041+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0615",
"initial_release_date": "2026-03-05T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "8",
"product": {
"name": "Red Hat Enterprise Linux 8",
"product_id": "T051453",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8"
}
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "Red Hat Enterprise Linux 9",
"product_id": "T051454",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9"
}
}
},
{
"category": "product_version",
"name": "9.4",
"product": {
"name": "Red Hat Enterprise Linux 9.4",
"product_id": "T051455",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9.4"
}
}
},
{
"category": "product_version",
"name": "9.6",
"product": {
"name": "Red Hat Enterprise Linux 9.6",
"product_id": "T051456",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9.6"
}
}
},
{
"category": "product_version",
"name": "10",
"product": {
"name": "Red Hat Enterprise Linux 10",
"product_id": "T051457",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-12801",
"product_status": {
"known_affected": [
"T051456",
"T051455",
"T051457",
"T004914",
"T051454",
"T051453"
]
},
"release_date": "2026-03-05T23:00:00.000+00:00",
"title": "CVE-2025-12801"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.