Action not permitted
Modal body text goes here.
cve-2021-30858
Vulnerability from cvelistv5
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2021-11-03
Due date: 2021-11-17
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-30858
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:48:13.458Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT212804" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT212807" }, { "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/27" }, { "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/25" }, { "name": "20210917 APPLE-SA-2021-09-13-5 Safari 14.1.2", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/29" }, { "name": "[oss-security] 20210920 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0005", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/20/1" }, { "name": "FEDORA-2021-c00e45b6c0", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/" }, { "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/38" }, { "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/39" }, { "name": "DSA-4975", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4975" }, { "name": "DSA-4976", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4976" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212824" }, { "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/50" }, { "name": "FEDORA-2021-edf6957b7d", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/" }, { "name": "[oss-security] 20211026 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/26/9" }, { "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/27/1" }, { "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/27/2" }, { "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "11.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "iOS", "vendor": "Apple", "versions": [ { "lessThan": "14.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited." } ], "problemTypes": [ { "descriptions": [ { "description": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-27T20:06:21", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT212804" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT212807" }, { "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/27" }, { "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/25" }, { "name": "20210917 APPLE-SA-2021-09-13-5 Safari 14.1.2", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/29" }, { "name": "[oss-security] 20210920 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0005", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/20/1" }, { "name": "FEDORA-2021-c00e45b6c0", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/" }, { "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/38" }, { "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/39" }, { "name": "DSA-4975", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4975" }, { "name": "DSA-4976", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4976" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212824" }, { "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/50" }, { "name": "FEDORA-2021-edf6957b7d", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/" }, { "name": "[oss-security] 20211026 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/26/9" }, { "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/27/1" }, { "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/27/2" }, { "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2021-30858", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "11.6" } ] } }, { "product_name": "iOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "14.8" } ] } } ] }, "vendor_name": "Apple" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited." } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/en-us/HT212804", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT212804" }, { "name": "https://support.apple.com/en-us/HT212807", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT212807" }, { "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/27" }, { "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/25" }, { "name": "20210917 APPLE-SA-2021-09-13-5 Safari 14.1.2", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/29" }, { "name": "[oss-security] 20210920 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0005", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/20/1" }, { "name": "FEDORA-2021-c00e45b6c0", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/" }, { "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/38" }, { "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/39" }, { "name": "DSA-4975", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4975" }, { "name": "DSA-4976", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4976" }, { "name": "https://support.apple.com/kb/HT212824", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212824" }, { "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/50" }, { "name": "FEDORA-2021-edf6957b7d", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/" }, { "name": "[oss-security] 20211026 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/10/26/9" }, { "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/10/27/1" }, { "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/10/27/2" }, { "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2021-30858", "datePublished": "2021-08-24T18:49:23", "dateReserved": "2021-04-13T00:00:00", "dateUpdated": "2024-08-03T22:48:13.458Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "cisa_known_exploited": { "cveID": "CVE-2021-30858", "cwes": "[\"CWE-416\"]", "dateAdded": "2021-11-03", "dueDate": "2021-11-17", "knownRansomwareCampaignUse": "Unknown", "notes": "https://nvd.nist.gov/vuln/detail/CVE-2021-30858", "product": "iOS, iPadOS, and macOS", "requiredAction": "Apply updates per vendor instructions.", "shortDescription": "Apple iOS, iPadOS, and macOS WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.", "vendorProject": "Apple", "vulnerabilityName": "Apple iOS, iPadOS, macOS Use-After-Free Vulnerability" }, "nvd": "{\"cve\":{\"id\":\"CVE-2021-30858\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2021-08-24T19:15:14.253\",\"lastModified\":\"2024-07-29T18:30:12.843\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"cisaExploitAdd\":\"2021-11-03\",\"cisaActionDue\":\"2021-11-17\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Apple iOS, iPadOS, macOS Use-After-Free Vulnerability\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.\"},{\"lang\":\"es\",\"value\":\"Se ha solucionado un problema de uso despu\u00e9s de la liberaci\u00f3n con una mejor gesti\u00f3n de la memoria. Este problema se ha solucionado en iOS 14.8 y iPadOS 14.8, macOS Big Sur 11.6. El procesamiento de contenido web malicioso puede conducir a la ejecuci\u00f3n de c\u00f3digo arbitrario. Apple tiene conocimiento de un informe que indica que este problema puede haber sido explotado activamente.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":6.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1\",\"versionEndExcluding\":\"14.8\",\"matchCriteriaId\":\"6B243B4E-56A5-4950-A291-13EF0E402185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.5.5\",\"matchCriteriaId\":\"5998D71C-A481-4F0C-AA06-B1FF0E6664A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0\",\"versionEndExcluding\":\"14.8\",\"matchCriteriaId\":\"478E12B4-50EB-4CB2-9C50-D8F08127FB12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"11.6\",\"matchCriteriaId\":\"5F52D69C-8621-4E01-ABDE-8473A590BCB6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/fulldisclosure/2021/Sep/25\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Sep/27\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Sep/29\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Sep/38\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Sep/39\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Sep/50\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/09/20/1\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/10/26/9\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/10/27/1\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/10/27/2\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/10/27/4\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://support.apple.com/en-us/HT212804\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT212807\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT212824\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4975\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4976\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]}]}}" } }
rhsa-2021_4686
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30858)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4686", "url": "https://access.redhat.com/errata/RHSA-2021:4686" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2006099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006099" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4686.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security update", "tracking": { "current_release_date": "2024-11-06T00:09:32+00:00", "generator": { "date": "2024-11-06T00:09:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:4686", "initial_release_date": "2021-11-16T08:16:26+00:00", "revision_history": [ { "date": "2021-11-16T08:16:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-16T08:16:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:09:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.24.4-4.el8_1.src", "product": { "name": "webkit2gtk3-0:2.24.4-4.el8_1.src", "product_id": "webkit2gtk3-0:2.24.4-4.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.24.4-4.el8_1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.24.4-4.el8_1.aarch64", "product": { "name": "webkit2gtk3-0:2.24.4-4.el8_1.aarch64", "product_id": "webkit2gtk3-0:2.24.4-4.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.24.4-4.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.aarch64", "product_id": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.24.4-4.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.aarch64", "product": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.aarch64", "product_id": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2@2.24.4-4.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.24.4-4.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.24.4-4.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.24.4-4.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.24.4-4.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.24.4-4.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.aarch64", "product": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.aarch64", "product_id": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2-debuginfo@2.24.4-4.el8_1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.24.4-4.el8_1.ppc64le", "product": { "name": "webkit2gtk3-0:2.24.4-4.el8_1.ppc64le", "product_id": "webkit2gtk3-0:2.24.4-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.24.4-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.24.4-4.el8_1.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.24.4-4.el8_1.ppc64le", "product_id": "webkit2gtk3-devel-0:2.24.4-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.24.4-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.24.4-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.24.4-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.ppc64le", "product": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.ppc64le", "product_id": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2@2.24.4-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.24.4-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.24.4-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.24.4-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.24.4-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.24.4-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.ppc64le", "product": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.ppc64le", "product_id": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2-debuginfo@2.24.4-4.el8_1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.24.4-4.el8_1.i686", "product": { "name": "webkit2gtk3-0:2.24.4-4.el8_1.i686", "product_id": "webkit2gtk3-0:2.24.4-4.el8_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.24.4-4.el8_1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.24.4-4.el8_1.i686", "product": { "name": "webkit2gtk3-devel-0:2.24.4-4.el8_1.i686", "product_id": "webkit2gtk3-devel-0:2.24.4-4.el8_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.24.4-4.el8_1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.i686", "product": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.i686", "product_id": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.24.4-4.el8_1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.24.4-4.el8_1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.i686", "product": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.i686", "product_id": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2@2.24.4-4.el8_1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.i686", "product_id": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.24.4-4.el8_1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.i686", "product_id": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.24.4-4.el8_1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.24.4-4.el8_1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.24.4-4.el8_1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.24.4-4.el8_1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.i686", "product": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.i686", "product_id": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2-debuginfo@2.24.4-4.el8_1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.24.4-4.el8_1.x86_64", "product": { "name": "webkit2gtk3-0:2.24.4-4.el8_1.x86_64", "product_id": "webkit2gtk3-0:2.24.4-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.24.4-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.24.4-4.el8_1.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.24.4-4.el8_1.x86_64", "product_id": "webkit2gtk3-devel-0:2.24.4-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.24.4-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.x86_64", "product_id": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.24.4-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.24.4-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.x86_64", "product": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.x86_64", "product_id": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2@2.24.4-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.24.4-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.24.4-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.24.4-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.24.4-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.24.4-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.x86_64", "product": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.x86_64", "product_id": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2-debuginfo@2.24.4-4.el8_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.24.4-4.el8_1.s390x", "product": { "name": "webkit2gtk3-0:2.24.4-4.el8_1.s390x", "product_id": "webkit2gtk3-0:2.24.4-4.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.24.4-4.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.s390x", "product_id": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.24.4-4.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.s390x", "product": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.s390x", "product_id": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2@2.24.4-4.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.s390x", "product_id": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.24.4-4.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.24.4-4.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.24.4-4.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.24.4-4.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.24.4-4.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.s390x", "product": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.s390x", "product_id": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2-debuginfo@2.24.4-4.el8_1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.24.4-4.el8_1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.aarch64" }, "product_reference": "webkit2gtk3-0:2.24.4-4.el8_1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.24.4-4.el8_1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.i686" }, "product_reference": "webkit2gtk3-0:2.24.4-4.el8_1.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.24.4-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.ppc64le" }, "product_reference": "webkit2gtk3-0:2.24.4-4.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.24.4-4.el8_1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.s390x" }, "product_reference": "webkit2gtk3-0:2.24.4-4.el8_1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.24.4-4.el8_1.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.src" }, "product_reference": "webkit2gtk3-0:2.24.4-4.el8_1.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.24.4-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.x86_64" }, "product_reference": "webkit2gtk3-0:2.24.4-4.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.24.4-4.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.24.4-4.el8_1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_1.i686" }, "product_reference": "webkit2gtk3-devel-0:2.24.4-4.el8_1.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.24.4-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_1.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.24.4-4.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.24.4-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_1.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.24.4-4.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.24.4-4.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.aarch64" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.i686" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.ppc64le" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.s390x" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.x86_64" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.aarch64" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.i686" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.ppc64le" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.s390x" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.x86_64" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-30858", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2006099" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. This flaw could allow an attacker to use maliciously crafted web content leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact considering the ability of an attacker to perform arbitrary code execution is limited to cases where a web browser is involved. Red Hat expects customers to not feed untrusted input into WebKit.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.src", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30858" }, { "category": "external", "summary": "RHBZ#2006099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30858", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30858" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30858", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30858" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0005.html", "url": "https://webkitgtk.org/security/WSA-2021-0005.html" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/09/20/1", "url": "https://www.openwall.com/lists/oss-security/2021/09/20/1" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-16T08:16:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.src", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4686" }, { "category": "workaround", "details": "This flaw can be mitigated by either disabling JavaScript or by disabling IndexedDB", "product_ids": [ "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.src", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.src", "AppStream-8.1.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.i686", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.s390x", "AppStream-8.1.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_1.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" } ] }
rhsa-2022_0075
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30858)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0075", "url": "https://access.redhat.com/errata/RHSA-2022:0075" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2006099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006099" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0075.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security update", "tracking": { "current_release_date": "2024-11-06T00:18:13+00:00", "generator": { "date": "2024-11-06T00:18:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0075", "initial_release_date": "2022-01-11T16:09:12+00:00", "revision_history": [ { "date": "2022-01-11T16:09:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-01-11T16:09:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:18:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.24.4-4.el8_2.src", "product": { "name": "webkit2gtk3-0:2.24.4-4.el8_2.src", "product_id": "webkit2gtk3-0:2.24.4-4.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.24.4-4.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.24.4-4.el8_2.aarch64", "product": { "name": "webkit2gtk3-0:2.24.4-4.el8_2.aarch64", "product_id": "webkit2gtk3-0:2.24.4-4.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.24.4-4.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.24.4-4.el8_2.aarch64", "product": { "name": "webkit2gtk3-devel-0:2.24.4-4.el8_2.aarch64", "product_id": "webkit2gtk3-devel-0:2.24.4-4.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.24.4-4.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.aarch64", "product_id": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.24.4-4.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.aarch64", "product_id": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.24.4-4.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.aarch64", "product": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.aarch64", "product_id": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2@2.24.4-4.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.24.4-4.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.24.4-4.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.24.4-4.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.24.4-4.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.24.4-4.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.aarch64", "product": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.aarch64", "product_id": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2-debuginfo@2.24.4-4.el8_2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.24.4-4.el8_2.ppc64le", "product": { "name": "webkit2gtk3-0:2.24.4-4.el8_2.ppc64le", "product_id": "webkit2gtk3-0:2.24.4-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.24.4-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.24.4-4.el8_2.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.24.4-4.el8_2.ppc64le", "product_id": "webkit2gtk3-devel-0:2.24.4-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.24.4-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.24.4-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.24.4-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.ppc64le", "product": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.ppc64le", "product_id": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2@2.24.4-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.24.4-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.24.4-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.24.4-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.24.4-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.24.4-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.ppc64le", "product": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.ppc64le", "product_id": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2-debuginfo@2.24.4-4.el8_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.24.4-4.el8_2.i686", "product": { "name": "webkit2gtk3-0:2.24.4-4.el8_2.i686", "product_id": "webkit2gtk3-0:2.24.4-4.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.24.4-4.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.24.4-4.el8_2.i686", "product": { "name": "webkit2gtk3-devel-0:2.24.4-4.el8_2.i686", "product_id": "webkit2gtk3-devel-0:2.24.4-4.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.24.4-4.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.i686", "product": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.i686", "product_id": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.24.4-4.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.24.4-4.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.i686", "product": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.i686", "product_id": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2@2.24.4-4.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.i686", "product_id": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.24.4-4.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.i686", "product_id": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.24.4-4.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.24.4-4.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.24.4-4.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.24.4-4.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.i686", "product": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.i686", "product_id": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2-debuginfo@2.24.4-4.el8_2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.24.4-4.el8_2.x86_64", "product": { "name": "webkit2gtk3-0:2.24.4-4.el8_2.x86_64", "product_id": "webkit2gtk3-0:2.24.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.24.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.24.4-4.el8_2.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.24.4-4.el8_2.x86_64", "product_id": "webkit2gtk3-devel-0:2.24.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.24.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.x86_64", "product_id": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.24.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.24.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.x86_64", "product": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.x86_64", "product_id": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2@2.24.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.24.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.24.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.24.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.24.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.24.4-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.x86_64", "product": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.x86_64", "product_id": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2-debuginfo@2.24.4-4.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.24.4-4.el8_2.s390x", "product": { "name": "webkit2gtk3-0:2.24.4-4.el8_2.s390x", "product_id": "webkit2gtk3-0:2.24.4-4.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.24.4-4.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.s390x", "product_id": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.24.4-4.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.s390x", "product": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.s390x", "product_id": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2@2.24.4-4.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.s390x", "product_id": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.24.4-4.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.24.4-4.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.24.4-4.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.24.4-4.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.24.4-4.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.s390x", "product": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.s390x", "product_id": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-plugin-process-gtk2-debuginfo@2.24.4-4.el8_2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.24.4-4.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.aarch64" }, "product_reference": "webkit2gtk3-0:2.24.4-4.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.24.4-4.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.i686" }, "product_reference": "webkit2gtk3-0:2.24.4-4.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.24.4-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.ppc64le" }, "product_reference": "webkit2gtk3-0:2.24.4-4.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.24.4-4.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.s390x" }, "product_reference": "webkit2gtk3-0:2.24.4-4.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.24.4-4.el8_2.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.src" }, "product_reference": "webkit2gtk3-0:2.24.4-4.el8_2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.24.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.x86_64" }, "product_reference": "webkit2gtk3-0:2.24.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.24.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.24.4-4.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.aarch64" }, "product_reference": "webkit2gtk3-devel-0:2.24.4-4.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.24.4-4.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.i686" }, "product_reference": "webkit2gtk3-devel-0:2.24.4-4.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.24.4-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.24.4-4.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.24.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.24.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.24.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.aarch64" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.i686" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.ppc64le" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.s390x" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.x86_64" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.aarch64" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.i686" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.ppc64le" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.s390x" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.x86_64" }, "product_reference": "webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-30858", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2006099" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. This flaw could allow an attacker to use maliciously crafted web content leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact considering the ability of an attacker to perform arbitrary code execution is limited to cases where a web browser is involved. Red Hat expects customers to not feed untrusted input into WebKit.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.src", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30858" }, { "category": "external", "summary": "RHBZ#2006099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30858", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30858" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30858", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30858" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0005.html", "url": "https://webkitgtk.org/security/WSA-2021-0005.html" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/09/20/1", "url": "https://www.openwall.com/lists/oss-security/2021/09/20/1" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-11T16:09:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.src", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0075" }, { "category": "workaround", "details": "This flaw can be mitigated by either disabling JavaScript or by disabling IndexedDB", "product_ids": [ "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.src", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.src", "AppStream-8.2.0.Z.EUS:webkit2gtk3-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-0:2.24.4-4.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.i686", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.s390x", "AppStream-8.2.0.Z.EUS:webkit2gtk3-plugin-process-gtk2-debuginfo-0:2.24.4-4.el8_2.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" } ] }
rhsa-2022_0059
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkitgtk4 is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30858)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0059", "url": "https://access.redhat.com/errata/RHSA-2022:0059" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2006099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006099" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0059.json" } ], "title": "Red Hat Security Advisory: webkitgtk4 security update", "tracking": { "current_release_date": "2024-11-06T00:17:41+00:00", "generator": { "date": "2024-11-06T00:17:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0059", "initial_release_date": "2022-01-11T18:03:28+00:00", "revision_history": [ { "date": "2022-01-11T18:03:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-01-11T18:03:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:17:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.28.2-3.el7.src", "product": { "name": "webkitgtk4-0:2.28.2-3.el7.src", "product_id": "webkitgtk4-0:2.28.2-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.28.2-3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.28.2-3.el7.x86_64", "product": { "name": "webkitgtk4-0:2.28.2-3.el7.x86_64", "product_id": "webkitgtk4-0:2.28.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.28.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "product": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "product_id": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.28.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "product": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "product_id": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.28.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "product": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "product_id": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.28.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "product": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "product_id": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.28.2-3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.28.2-3.el7.i686", "product": { "name": "webkitgtk4-0:2.28.2-3.el7.i686", "product_id": "webkitgtk4-0:2.28.2-3.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.28.2-3.el7?arch=i686" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.28.2-3.el7.i686", "product": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.i686", "product_id": "webkitgtk4-jsc-0:2.28.2-3.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.28.2-3.el7?arch=i686" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "product": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "product_id": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.28.2-3.el7?arch=i686" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.28.2-3.el7.i686", "product": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.i686", "product_id": "webkitgtk4-devel-0:2.28.2-3.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.28.2-3.el7?arch=i686" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "product": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "product_id": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.28.2-3.el7?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-doc-0:2.28.2-3.el7.noarch", "product": { "name": "webkitgtk4-doc-0:2.28.2-3.el7.noarch", "product_id": "webkitgtk4-doc-0:2.28.2-3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-doc@2.28.2-3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.28.2-3.el7.ppc", "product": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc", "product_id": "webkitgtk4-0:2.28.2-3.el7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.28.2-3.el7?arch=ppc" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "product": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "product_id": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.28.2-3.el7?arch=ppc" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "product": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "product_id": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.28.2-3.el7?arch=ppc" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc", "product": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc", "product_id": "webkitgtk4-devel-0:2.28.2-3.el7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.28.2-3.el7?arch=ppc" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "product": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "product_id": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.28.2-3.el7?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.28.2-3.el7.ppc64", "product": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc64", "product_id": "webkitgtk4-0:2.28.2-3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.28.2-3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "product": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "product_id": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.28.2-3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "product": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "product_id": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.28.2-3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "product": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "product_id": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.28.2-3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "product": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "product_id": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.28.2-3.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.28.2-3.el7.ppc64le", "product": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc64le", "product_id": "webkitgtk4-0:2.28.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.28.2-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "product": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "product_id": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.28.2-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "product": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "product_id": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.28.2-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "product": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "product_id": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.28.2-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "product": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "product_id": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.28.2-3.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.28.2-3.el7.s390", "product": { "name": "webkitgtk4-0:2.28.2-3.el7.s390", "product_id": "webkitgtk4-0:2.28.2-3.el7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.28.2-3.el7?arch=s390" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390", "product": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390", "product_id": "webkitgtk4-jsc-0:2.28.2-3.el7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.28.2-3.el7?arch=s390" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "product": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "product_id": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.28.2-3.el7?arch=s390" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390", "product": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390", "product_id": "webkitgtk4-devel-0:2.28.2-3.el7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.28.2-3.el7?arch=s390" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "product": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "product_id": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.28.2-3.el7?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.28.2-3.el7.s390x", "product": { "name": "webkitgtk4-0:2.28.2-3.el7.s390x", "product_id": "webkitgtk4-0:2.28.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.28.2-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "product": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "product_id": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.28.2-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "product": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "product_id": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.28.2-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390x", "product": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390x", "product_id": "webkitgtk4-devel-0:2.28.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.28.2-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "product": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "product_id": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.28.2-3.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.28.2-3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch" }, "product_reference": "webkitgtk4-doc-0:2.28.2-3.el7.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.28.2-3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch" }, "product_reference": "webkitgtk4-doc-0:2.28.2-3.el7.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.28.2-3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch" }, "product_reference": "webkitgtk4-doc-0:2.28.2-3.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.28.2-3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch" }, "product_reference": "webkitgtk4-doc-0:2.28.2-3.el7.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.28.2-3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch" }, "product_reference": "webkitgtk4-doc-0:2.28.2-3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.28.2-3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch" }, "product_reference": "webkitgtk4-doc-0:2.28.2-3.el7.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.28.2-3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch" }, "product_reference": "webkitgtk4-doc-0:2.28.2-3.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-30858", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2006099" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. This flaw could allow an attacker to use maliciously crafted web content leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact considering the ability of an attacker to perform arbitrary code execution is limited to cases where a web browser is involved. Red Hat expects customers to not feed untrusted input into WebKit.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Client-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30858" }, { "category": "external", "summary": "RHBZ#2006099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30858", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30858" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30858", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30858" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0005.html", "url": "https://webkitgtk.org/security/WSA-2021-0005.html" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/09/20/1", "url": "https://www.openwall.com/lists/oss-security/2021/09/20/1" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-11T18:03:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Client-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0059" }, { "category": "workaround", "details": "This flaw can be mitigated by either disabling JavaScript or by disabling IndexedDB", "product_ids": [ "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Client-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Client-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Client-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Client-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Client-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Client-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7ComputeNode-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7ComputeNode-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Server-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Server-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Server-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Server-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Workstation-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Workstation-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.src", "7Workstation-optional-7.9.Z:webkitgtk4-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-debuginfo-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-devel-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-doc-0:2.28.2-3.el7.noarch", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-0:2.28.2-3.el7.x86_64", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.i686", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.ppc64le", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.s390x", "7Workstation-optional-7.9.Z:webkitgtk4-jsc-devel-0:2.28.2-3.el7.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" } ] }
rhsa-2021_4097
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30858)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* WebProcess::initializeWebProcess crashing on aarch64 (BZ#2010825)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4097", "url": "https://access.redhat.com/errata/RHSA-2021:4097" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2006099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006099" }, { "category": "external", "summary": "2010825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010825" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4097.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security and bug fix update", "tracking": { "current_release_date": "2024-11-06T00:03:34+00:00", "generator": { "date": "2024-11-06T00:03:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:4097", "initial_release_date": "2021-11-02T12:05:44+00:00", "revision_history": [ { "date": "2021-11-02T12:05:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-02T12:05:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:03:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.30.4-3.el8_4.src", "product": { "name": "webkit2gtk3-0:2.30.4-3.el8_4.src", "product_id": "webkit2gtk3-0:2.30.4-3.el8_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.30.4-3.el8_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.30.4-3.el8_4.aarch64", "product": { "name": "webkit2gtk3-0:2.30.4-3.el8_4.aarch64", "product_id": "webkit2gtk3-0:2.30.4-3.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.30.4-3.el8_4?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.30.4-3.el8_4.aarch64", "product": { "name": "webkit2gtk3-devel-0:2.30.4-3.el8_4.aarch64", "product_id": "webkit2gtk3-devel-0:2.30.4-3.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.30.4-3.el8_4?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.aarch64", "product_id": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.30.4-3.el8_4?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.aarch64", "product_id": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.30.4-3.el8_4?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.30.4-3.el8_4?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.30.4-3.el8_4?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.30.4-3.el8_4?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.30.4-3.el8_4?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.30.4-3.el8_4?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.30.4-3.el8_4.ppc64le", "product": { "name": "webkit2gtk3-0:2.30.4-3.el8_4.ppc64le", "product_id": "webkit2gtk3-0:2.30.4-3.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.30.4-3.el8_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.30.4-3.el8_4.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.30.4-3.el8_4.ppc64le", "product_id": "webkit2gtk3-devel-0:2.30.4-3.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.30.4-3.el8_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.30.4-3.el8_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.30.4-3.el8_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.30.4-3.el8_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.30.4-3.el8_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.30.4-3.el8_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.30.4-3.el8_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.30.4-3.el8_4?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.30.4-3.el8_4.i686", "product": { "name": "webkit2gtk3-0:2.30.4-3.el8_4.i686", "product_id": "webkit2gtk3-0:2.30.4-3.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.30.4-3.el8_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.30.4-3.el8_4.i686", "product": { "name": "webkit2gtk3-devel-0:2.30.4-3.el8_4.i686", "product_id": "webkit2gtk3-devel-0:2.30.4-3.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.30.4-3.el8_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.i686", "product": { "name": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.i686", "product_id": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.30.4-3.el8_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.30.4-3.el8_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.i686", "product_id": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.30.4-3.el8_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.i686", "product_id": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.30.4-3.el8_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.30.4-3.el8_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.30.4-3.el8_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.30.4-3.el8_4?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.30.4-3.el8_4.x86_64", "product": { "name": "webkit2gtk3-0:2.30.4-3.el8_4.x86_64", "product_id": "webkit2gtk3-0:2.30.4-3.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.30.4-3.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.30.4-3.el8_4.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.30.4-3.el8_4.x86_64", "product_id": "webkit2gtk3-devel-0:2.30.4-3.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.30.4-3.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.x86_64", "product_id": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.30.4-3.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.30.4-3.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.30.4-3.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.30.4-3.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.30.4-3.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.30.4-3.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.30.4-3.el8_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.30.4-3.el8_4.s390x", "product": { "name": "webkit2gtk3-0:2.30.4-3.el8_4.s390x", "product_id": "webkit2gtk3-0:2.30.4-3.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.30.4-3.el8_4?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.30.4-3.el8_4.s390x", "product": { "name": "webkit2gtk3-devel-0:2.30.4-3.el8_4.s390x", "product_id": "webkit2gtk3-devel-0:2.30.4-3.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.30.4-3.el8_4?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.s390x", "product_id": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.30.4-3.el8_4?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.s390x", "product": { "name": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.s390x", "product_id": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.30.4-3.el8_4?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.s390x", "product_id": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.30.4-3.el8_4?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.30.4-3.el8_4?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.30.4-3.el8_4?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.30.4-3.el8_4?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.30.4-3.el8_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.30.4-3.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.aarch64" }, "product_reference": "webkit2gtk3-0:2.30.4-3.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.30.4-3.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.i686" }, "product_reference": "webkit2gtk3-0:2.30.4-3.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.30.4-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-0:2.30.4-3.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.30.4-3.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.s390x" }, "product_reference": "webkit2gtk3-0:2.30.4-3.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.30.4-3.el8_4.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.src" }, "product_reference": "webkit2gtk3-0:2.30.4-3.el8_4.src", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.30.4-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.x86_64" }, "product_reference": "webkit2gtk3-0:2.30.4-3.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.30.4-3.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.30.4-3.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.aarch64" }, "product_reference": "webkit2gtk3-devel-0:2.30.4-3.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.30.4-3.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.i686" }, "product_reference": "webkit2gtk3-devel-0:2.30.4-3.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.30.4-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.30.4-3.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.30.4-3.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.s390x" }, "product_reference": "webkit2gtk3-devel-0:2.30.4-3.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.30.4-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.30.4-3.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.30.4-3.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-30858", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2006099" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. This flaw could allow an attacker to use maliciously crafted web content leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact considering the ability of an attacker to perform arbitrary code execution is limited to cases where a web browser is involved. Red Hat expects customers to not feed untrusted input into WebKit.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.src", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30858" }, { "category": "external", "summary": "RHBZ#2006099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30858", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30858" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30858", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30858" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0005.html", "url": "https://webkitgtk.org/security/WSA-2021-0005.html" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/09/20/1", "url": "https://www.openwall.com/lists/oss-security/2021/09/20/1" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-02T12:05:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.src", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4097" }, { "category": "workaround", "details": "This flaw can be mitigated by either disabling JavaScript or by disabling IndexedDB", "product_ids": [ "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.src", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.src", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.30.4-3.el8_4.x86_64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.aarch64", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.i686", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.ppc64le", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.s390x", "AppStream-8.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.30.4-3.el8_4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" } ] }
wid-sec-w-2022-0302
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0302 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0302.json" }, { "category": "self", "summary": "WID-SEC-2022-0302 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0302" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04", "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-015", "url": "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-015-FreeFlow-Print-Server-v7.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-013 vom 2022-06-14", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-013-FreeFlow-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-012 vom 2022-06-14", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-012-FreeFlow-Printer.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen erm\u00f6glichen Ausf\u00fchren von beliebigem Programmcode mit Administratorrechten", "tracking": { "current_release_date": "2023-04-03T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:48:03.842+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0302", "initial_release_date": "2022-06-14T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-14T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-06-21T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2023-04-03T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server 7", "product": { "name": "Xerox FreeFlow Print Server 7", "product_id": "T000872", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:7" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server 9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2124", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2016-2124" }, { "cve": "CVE-2019-14822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2019-14822" }, { "cve": "CVE-2019-19906", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2019-19906" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-17049", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-17049" }, { "cve": "CVE-2020-25717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-25717" }, { "cve": "CVE-2020-25718", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-25718" }, { "cve": "CVE-2020-25719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-25719" }, { "cve": "CVE-2020-25721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-25721" }, { "cve": "CVE-2020-25722", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-25722" }, { "cve": "CVE-2020-9484", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2020-9484" }, { "cve": "CVE-2021-21707", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-21707" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-23192", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-23192" }, { "cve": "CVE-2021-27815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-27815" }, { "cve": "CVE-2021-30846", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-30846" }, { "cve": "CVE-2021-30848", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-30848" }, { "cve": "CVE-2021-30849", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-30849" }, { "cve": "CVE-2021-30851", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-30851" }, { "cve": "CVE-2021-30858", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-30858" }, { "cve": "CVE-2021-33430", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-33430" }, { "cve": "CVE-2021-34141", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-34141" }, { "cve": "CVE-2021-35604", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-35604" }, { "cve": "CVE-2021-35624", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-35624" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3733", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3733" }, { "cve": "CVE-2021-3737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3737" }, { "cve": "CVE-2021-3738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3738" }, { "cve": "CVE-2021-3770", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3770" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-38115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-38115" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-39212", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39212" }, { "cve": "CVE-2021-39272", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39272" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-39920", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39920" }, { "cve": "CVE-2021-39921", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39921" }, { "cve": "CVE-2021-39922", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39922" }, { "cve": "CVE-2021-39923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39923" }, { "cve": "CVE-2021-39924", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39924" }, { "cve": "CVE-2021-39925", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39925" }, { "cve": "CVE-2021-39926", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39926" }, { "cve": "CVE-2021-39928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39928" }, { "cve": "CVE-2021-39929", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-39929" }, { "cve": "CVE-2021-4008", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4008" }, { "cve": "CVE-2021-4009", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4009" }, { "cve": "CVE-2021-4010", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4010" }, { "cve": "CVE-2021-4011", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4011" }, { "cve": "CVE-2021-40145", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-40145" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4034", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4034" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-40812", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-40812" }, { "cve": "CVE-2021-41133", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-41133" }, { "cve": "CVE-2021-4140", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4140" }, { "cve": "CVE-2021-41495", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-41495" }, { "cve": "CVE-2021-41496", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-41496" }, { "cve": "CVE-2021-4160", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4160" }, { "cve": "CVE-2021-4181", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4181" }, { "cve": "CVE-2021-41817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-41817" }, { "cve": "CVE-2021-41819", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-41819" }, { "cve": "CVE-2021-4182", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4182" }, { "cve": "CVE-2021-4183", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4183" }, { "cve": "CVE-2021-4184", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4184" }, { "cve": "CVE-2021-4185", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-4185" }, { "cve": "CVE-2021-42717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-42717" }, { "cve": "CVE-2021-42762", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-42762" }, { "cve": "CVE-2021-43331", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43331" }, { "cve": "CVE-2021-43332", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43332" }, { "cve": "CVE-2021-43395", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43395" }, { "cve": "CVE-2021-43527", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43527" }, { "cve": "CVE-2021-43528", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43528" }, { "cve": "CVE-2021-43536", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43536" }, { "cve": "CVE-2021-43537", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43537" }, { "cve": "CVE-2021-43538", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43538" }, { "cve": "CVE-2021-43539", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43539" }, { "cve": "CVE-2021-43541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43541" }, { "cve": "CVE-2021-43542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43542" }, { "cve": "CVE-2021-43543", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43543" }, { "cve": "CVE-2021-43545", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43545" }, { "cve": "CVE-2021-43546", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43546" }, { "cve": "CVE-2021-43566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43566" }, { "cve": "CVE-2021-43818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-43818" }, { "cve": "CVE-2021-44142", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44142" }, { "cve": "CVE-2021-44224", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44224" }, { "cve": "CVE-2021-44227", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44227" }, { "cve": "CVE-2021-44420", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44420" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44540", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44540" }, { "cve": "CVE-2021-44541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44541" }, { "cve": "CVE-2021-44542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44542" }, { "cve": "CVE-2021-44543", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44543" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-45115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-45115" }, { "cve": "CVE-2021-45116", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-45116" }, { "cve": "CVE-2021-45452", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-45452" }, { "cve": "CVE-2021-45960", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2021-46143" }, { "cve": "CVE-2022-0336", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0336" }, { "cve": "CVE-2022-0391", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0566" }, { "cve": "CVE-2022-0581", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0581" }, { "cve": "CVE-2022-0582", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0582" }, { "cve": "CVE-2022-0583", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0583" }, { "cve": "CVE-2022-0585", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0585" }, { "cve": "CVE-2022-0586", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0586" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-21248", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21248" }, { "cve": "CVE-2022-21263", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21263" }, { "cve": "CVE-2022-21271", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21271" }, { "cve": "CVE-2022-21282", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21282" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-21293", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21293" }, { "cve": "CVE-2022-21294", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21294" }, { "cve": "CVE-2022-21296", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21296" }, { "cve": "CVE-2022-21298", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21298" }, { "cve": "CVE-2022-21299", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21299" }, { "cve": "CVE-2022-21305", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21305" }, { "cve": "CVE-2022-21340", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21340" }, { "cve": "CVE-2022-21341", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21341" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21360", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21360" }, { "cve": "CVE-2022-21365", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21365" }, { "cve": "CVE-2022-21375", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21375" }, { "cve": "CVE-2022-21384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21384" }, { "cve": "CVE-2022-21416", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21416" }, { "cve": "CVE-2022-21446", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21446" }, { "cve": "CVE-2022-21461", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21461" }, { "cve": "CVE-2022-21463", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21463" }, { "cve": "CVE-2022-21493", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21493" }, { "cve": "CVE-2022-21494", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21494" }, { "cve": "CVE-2022-21712", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21712" }, { "cve": "CVE-2022-21716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21716" }, { "cve": "CVE-2022-21824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-21824" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22737" }, { "cve": "CVE-2022-22738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22738" }, { "cve": "CVE-2022-22739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22739" }, { "cve": "CVE-2022-22740", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22740" }, { "cve": "CVE-2022-22741", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22741" }, { "cve": "CVE-2022-22742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22742" }, { "cve": "CVE-2022-22743", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22743" }, { "cve": "CVE-2022-22744", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22744" }, { "cve": "CVE-2022-22745", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22745" }, { "cve": "CVE-2022-22746", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22746" }, { "cve": "CVE-2022-22747", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22747" }, { "cve": "CVE-2022-22748", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22748" }, { "cve": "CVE-2022-22751", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22751" }, { "cve": "CVE-2022-22753", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22753" }, { "cve": "CVE-2022-22754", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22754" }, { "cve": "CVE-2022-22756", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22756" }, { "cve": "CVE-2022-22759", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22759" }, { "cve": "CVE-2022-22760", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22760" }, { "cve": "CVE-2022-22761", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22761" }, { "cve": "CVE-2022-22763", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22763" }, { "cve": "CVE-2022-22764", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22764" }, { "cve": "CVE-2022-22815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22815" }, { "cve": "CVE-2022-22816", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22816" }, { "cve": "CVE-2022-22817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22817" }, { "cve": "CVE-2022-22818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22818" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23181", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-23181" }, { "cve": "CVE-2022-23833", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-23833" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-23990", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26381", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26381" }, { "cve": "CVE-2022-26383", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26383" }, { "cve": "CVE-2022-26384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26384" }, { "cve": "CVE-2022-26386", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26386" }, { "cve": "CVE-2022-26387", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26387" }, { "cve": "CVE-2022-26485", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26485" }, { "cve": "CVE-2022-26486", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "T000872", "T002977" ] }, "release_date": "2022-06-14T22:00:00Z", "title": "CVE-2022-26486" } ] }
wid-sec-w-2022-0432
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0432 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0432.json" }, { "category": "self", "summary": "WID-SEC-2022-0432 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0432" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04", "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Mini Bulletin XRX21A vom 2022-06-21", "url": "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-014-FreeFlow-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-03T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:49:40.951+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0432", "initial_release_date": "2022-06-21T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-21T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server 9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2124", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2016-2124" }, { "cve": "CVE-2019-14822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2019-14822" }, { "cve": "CVE-2019-19906", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2019-19906" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-17049", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-17049" }, { "cve": "CVE-2020-25717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-25717" }, { "cve": "CVE-2020-25718", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-25718" }, { "cve": "CVE-2020-25719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-25719" }, { "cve": "CVE-2020-25721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-25721" }, { "cve": "CVE-2020-25722", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-25722" }, { "cve": "CVE-2020-9484", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2020-9484" }, { "cve": "CVE-2021-21707", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-21707" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-23192", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-23192" }, { "cve": "CVE-2021-27815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-27815" }, { "cve": "CVE-2021-30846", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-30846" }, { "cve": "CVE-2021-30848", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-30848" }, { "cve": "CVE-2021-30849", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-30849" }, { "cve": "CVE-2021-30851", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-30851" }, { "cve": "CVE-2021-30858", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-30858" }, { "cve": "CVE-2021-33430", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-33430" }, { "cve": "CVE-2021-34141", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-34141" }, { "cve": "CVE-2021-35604", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-35604" }, { "cve": "CVE-2021-35624", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-35624" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3733", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3733" }, { "cve": "CVE-2021-3737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3737" }, { "cve": "CVE-2021-3738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3738" }, { "cve": "CVE-2021-3770", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3770" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-38115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-38115" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-39212", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39212" }, { "cve": "CVE-2021-39272", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39272" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-39920", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39920" }, { "cve": "CVE-2021-39921", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39921" }, { "cve": "CVE-2021-39922", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39922" }, { "cve": "CVE-2021-39923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39923" }, { "cve": "CVE-2021-39924", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39924" }, { "cve": "CVE-2021-39925", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39925" }, { "cve": "CVE-2021-39926", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39926" }, { "cve": "CVE-2021-39928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39928" }, { "cve": "CVE-2021-39929", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-39929" }, { "cve": "CVE-2021-4008", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4008" }, { "cve": "CVE-2021-4009", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4009" }, { "cve": "CVE-2021-4010", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4010" }, { "cve": "CVE-2021-4011", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4011" }, { "cve": "CVE-2021-40145", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-40145" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4034", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4034" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-40812", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-40812" }, { "cve": "CVE-2021-41133", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-41133" }, { "cve": "CVE-2021-4140", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4140" }, { "cve": "CVE-2021-41495", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-41495" }, { "cve": "CVE-2021-41496", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-41496" }, { "cve": "CVE-2021-4181", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4181" }, { "cve": "CVE-2021-41817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-41817" }, { "cve": "CVE-2021-41819", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-41819" }, { "cve": "CVE-2021-4182", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4182" }, { "cve": "CVE-2021-4183", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4183" }, { "cve": "CVE-2021-4184", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4184" }, { "cve": "CVE-2021-4185", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-4185" }, { "cve": "CVE-2021-42717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-42717" }, { "cve": "CVE-2021-42762", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-42762" }, { "cve": "CVE-2021-43331", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43331" }, { "cve": "CVE-2021-43332", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43332" }, { "cve": "CVE-2021-43395", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43395" }, { "cve": "CVE-2021-43527", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43527" }, { "cve": "CVE-2021-43528", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43528" }, { "cve": "CVE-2021-43536", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43536" }, { "cve": "CVE-2021-43537", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43537" }, { "cve": "CVE-2021-43538", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43538" }, { "cve": "CVE-2021-43539", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43539" }, { "cve": "CVE-2021-43541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43541" }, { "cve": "CVE-2021-43542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43542" }, { "cve": "CVE-2021-43543", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43543" }, { "cve": "CVE-2021-43545", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43545" }, { "cve": "CVE-2021-43546", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43546" }, { "cve": "CVE-2021-43566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43566" }, { "cve": "CVE-2021-43818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-43818" }, { "cve": "CVE-2021-44142", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44142" }, { "cve": "CVE-2021-44224", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44224" }, { "cve": "CVE-2021-44227", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44227" }, { "cve": "CVE-2021-44420", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44420" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44540", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44540" }, { "cve": "CVE-2021-44541", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44541" }, { "cve": "CVE-2021-44542", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44542" }, { "cve": "CVE-2021-44543", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44543" }, { "cve": "CVE-2021-44790", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-44790" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-45115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-45115" }, { "cve": "CVE-2021-45116", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-45116" }, { "cve": "CVE-2021-45452", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-45452" }, { "cve": "CVE-2021-45960", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2021-46143" }, { "cve": "CVE-2022-0336", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0336" }, { "cve": "CVE-2022-0391", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0566" }, { "cve": "CVE-2022-0581", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0581" }, { "cve": "CVE-2022-0582", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0582" }, { "cve": "CVE-2022-0583", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0583" }, { "cve": "CVE-2022-0585", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0585" }, { "cve": "CVE-2022-0586", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0586" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-21248", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21248" }, { "cve": "CVE-2022-21263", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21263" }, { "cve": "CVE-2022-21271", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21271" }, { "cve": "CVE-2022-21282", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21282" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-21293", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21293" }, { "cve": "CVE-2022-21294", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21294" }, { "cve": "CVE-2022-21296", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21296" }, { "cve": "CVE-2022-21298", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21298" }, { "cve": "CVE-2022-21299", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21299" }, { "cve": "CVE-2022-21305", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21305" }, { "cve": "CVE-2022-21340", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21340" }, { "cve": "CVE-2022-21341", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21341" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21360", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21360" }, { "cve": "CVE-2022-21365", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21365" }, { "cve": "CVE-2022-21375", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21375" }, { "cve": "CVE-2022-21384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21384" }, { "cve": "CVE-2022-21416", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21416" }, { "cve": "CVE-2022-21446", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21446" }, { "cve": "CVE-2022-21461", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21461" }, { "cve": "CVE-2022-21463", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21463" }, { "cve": "CVE-2022-21493", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21493" }, { "cve": "CVE-2022-21494", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21494" }, { "cve": "CVE-2022-21712", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21712" }, { "cve": "CVE-2022-21716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21716" }, { "cve": "CVE-2022-21824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-21824" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22737" }, { "cve": "CVE-2022-22738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22738" }, { "cve": "CVE-2022-22739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22739" }, { "cve": "CVE-2022-22740", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22740" }, { "cve": "CVE-2022-22741", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22741" }, { "cve": "CVE-2022-22742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22742" }, { "cve": "CVE-2022-22743", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22743" }, { "cve": "CVE-2022-22744", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22744" }, { "cve": "CVE-2022-22745", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22745" }, { "cve": "CVE-2022-22746", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22746" }, { "cve": "CVE-2022-22747", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22747" }, { "cve": "CVE-2022-22748", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22748" }, { "cve": "CVE-2022-22751", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22751" }, { "cve": "CVE-2022-22753", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22753" }, { "cve": "CVE-2022-22754", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22754" }, { "cve": "CVE-2022-22756", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22756" }, { "cve": "CVE-2022-22759", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22759" }, { "cve": "CVE-2022-22760", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22760" }, { "cve": "CVE-2022-22761", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22761" }, { "cve": "CVE-2022-22763", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22763" }, { "cve": "CVE-2022-22764", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22764" }, { "cve": "CVE-2022-22815", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22815" }, { "cve": "CVE-2022-22816", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22816" }, { "cve": "CVE-2022-22817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22817" }, { "cve": "CVE-2022-22818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22818" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23181", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-23181" }, { "cve": "CVE-2022-23833", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-23833" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-23990", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-26381", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26381" }, { "cve": "CVE-2022-26383", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26383" }, { "cve": "CVE-2022-26384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26384" }, { "cve": "CVE-2022-26386", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26386" }, { "cve": "CVE-2022-26387", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26387" }, { "cve": "CVE-2022-26485", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26485" }, { "cve": "CVE-2022-26486", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T015632", "T002977" ] }, "release_date": "2022-06-21T22:00:00Z", "title": "CVE-2022-26486" } ] }
gsd-2021-30858
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2021-30858", "description": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.", "id": "GSD-2021-30858", "references": [ "https://www.suse.com/security/cve/CVE-2021-30858.html", "https://www.debian.org/security/2021/dsa-4975", "https://www.debian.org/security/2021/dsa-4976", "https://access.redhat.com/errata/RHSA-2022:0075", "https://access.redhat.com/errata/RHSA-2022:0059", "https://access.redhat.com/errata/RHSA-2021:4686", "https://access.redhat.com/errata/RHSA-2021:4097", "https://ubuntu.com/security/CVE-2021-30858", "https://advisories.mageia.org/CVE-2021-30858.html", "https://security.archlinux.org/CVE-2021-30858", "https://linux.oracle.com/cve/CVE-2021-30858.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-30858" ], "details": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.", "id": "GSD-2021-30858", "modified": "2023-12-13T01:23:30.606537Z", "schema_version": "1.4.0" } }, "namespaces": { "cisa.gov": { "cveID": "CVE-2021-30858", "dateAdded": "2021-11-03", "dueDate": "2021-11-17", "product": "iOS and iPadOS", "requiredAction": "Apply updates per vendor instructions.", "shortDescription": "Apple iOS and iPadOS Arbitrary Code Execution", "vendorProject": "Apple", "vulnerabilityName": "Apple Apple iOS and iPadOS Use-After-Free Vulnerability" }, "cve.org": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2021-30858", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "11.6" } ] } }, { "product_name": "iOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "14.8" } ] } } ] }, "vendor_name": "Apple" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited." } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/en-us/HT212804", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT212804" }, { "name": "https://support.apple.com/en-us/HT212807", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT212807" }, { "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/27" }, { "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/25" }, { "name": "20210917 APPLE-SA-2021-09-13-5 Safari 14.1.2", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/29" }, { "name": "[oss-security] 20210920 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0005", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/20/1" }, { "name": "FEDORA-2021-c00e45b6c0", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/" }, { "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/38" }, { "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/39" }, { "name": "DSA-4975", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4975" }, { "name": "DSA-4976", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4976" }, { "name": "https://support.apple.com/kb/HT212824", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212824" }, { "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/50" }, { "name": "FEDORA-2021-edf6957b7d", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/" }, { "name": "[oss-security] 20211026 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/10/26/9" }, { "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/10/27/1" }, { "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/10/27/2" }, { "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.8", "versionStartIncluding": "13.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.5.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.8", "versionStartIncluding": "13.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.6", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-30858" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/en-us/HT212807", "refsource": "MISC", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT212807" }, { "name": "https://support.apple.com/en-us/HT212804", "refsource": "MISC", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT212804" }, { "name": "20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/25" }, { "name": "20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/27" }, { "name": "20210917 APPLE-SA-2021-09-13-5 Safari 14.1.2", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/29" }, { "name": "[oss-security] 20210920 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0005", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/20/1" }, { "name": "FEDORA-2021-c00e45b6c0", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/" }, { "name": "20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/39" }, { "name": "20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/38" }, { "name": "DSA-4976", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4976" }, { "name": "DSA-4975", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4975" }, { "name": "https://support.apple.com/kb/HT212824", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212824" }, { "name": "20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/50" }, { "name": "FEDORA-2021-edf6957b7d", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/" }, { "name": "[oss-security] 20211026 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/26/9" }, { "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/27/1" }, { "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/27/2" }, { "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2021-12-03T02:27Z", "publishedDate": "2021-08-24T19:15Z" } } }
var-202108-2172
Vulnerability from variot
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. apple's iPadOS Products from multiple vendors, including Microsoft, contain freed memory usage vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Updates are Available for iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation). ========================================================================== Ubuntu Security Notice USN-5087-1 September 22, 2021
webkit2gtk vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.04
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in WebKitGTK. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.04: libjavascriptcoregtk-4.0-18 2.32.4-0ubuntu0.21.04.1 libwebkit2gtk-4.0-37 2.32.4-0ubuntu0.21.04.1
Ubuntu 20.04 LTS: libjavascriptcoregtk-4.0-18 2.32.4-0ubuntu0.20.04.1 libwebkit2gtk-4.0-37 2.32.4-0ubuntu0.20.04.1
Ubuntu 18.04 LTS: libjavascriptcoregtk-4.0-18 2.32.4-0ubuntu0.18.04.1 libwebkit2gtk-4.0-37 2.32.4-0ubuntu0.18.04.1
This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any applications that use WebKitGTK, such as Epiphany, to make all the necessary changes. Information about the security content is also available at https://support.apple.com/HT212804. Description: An integer overflow was addressed with improved input validation. CVE-2021-30860: The Citizen Lab
CUPS Available for: macOS Big Sur Impact: A local attacker may be able to elevate their privileges Description: A permissions issue existed. CVE-2021-30827: an anonymous researcher Entry added September 20, 2021
CUPS Available for: macOS Big Sur Impact: A local user may be able to read arbitrary files as root Description: This issue was addressed with improved checks. CVE-2021-30828: an anonymous researcher Entry added September 20, 2021
CUPS Available for: macOS Big Sur Impact: A local user may be able to execute arbitrary files Description: A URI parsing issue was addressed with improved parsing. CVE-2021-30829: an anonymous researcher Entry added September 20, 2021
curl Available for: macOS Big Sur Impact: curl could potentially reveal sensitive internal information to the server using a clear-text network protocol Description: A buffer overflow was addressed with improved input validation. CVE-2021-22925 Entry added September 20, 2021
CVMS Available for: macOS Big Sur Impact: A local attacker may be able to elevate their privileges Description: A memory corruption issue was addressed with improved state management. CVE-2021-30832: Mickey Jin (@patch1t) of Trend Micro Entry added September 20, 2021
FontParser Available for: macOS Big Sur Impact: Processing a maliciously crafted dfont file may lead to arbitrary code execution Description: This issue was addressed with improved checks. CVE-2021-30841: Xingwei Lin of Ant Security Light-Year Lab CVE-2021-30842: Xingwei Lin of Ant Security Light-Year Lab CVE-2021-30843: Xingwei Lin of Ant Security Light-Year Lab Entry added September 20, 2021
Gatekeeper Available for: macOS Big Sur Impact: A malicious application may bypass Gatekeeper checks Description: This issue was addressed with improved checks. CVE-2021-30853: Gordon Long (@ethicalhax) of Box, Inc. CVE-2021-30847: Mike Zhang of Pangu Lab Entry added September 20, 2021
Kernel Available for: macOS Big Sur Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2021-30830: Zweig of Kunlun Lab Entry added September 20, 2021
Kernel Available for: macOS Big Sur Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds read was addressed with improved input validation. CVE-2021-30865: Zweig of Kunlun Lab Entry added September 20, 2021
Kernel Available for: macOS Big Sur Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved locking. CVE-2021-30857: Zweig of Kunlun Lab Entry added September 20, 2021
Kernel Available for: macOS Big Sur Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A type confusion issue was addressed with improved state handling. CVE-2021-30859: Apple Entry added September 20, 2021
libexpat Available for: macOS Big Sur Impact: A remote attacker may be able to cause a denial of service Description: This issue was addressed by updating expat to version 2.4.1. CVE-2013-0340: an anonymous researcher Entry added September 20, 2021
Preferences Available for: macOS Big Sur Impact: An application may be able to access restricted files Description: A validation issue existed in the handling of symlinks. CVE-2021-30855: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020) of Tencent Security Xuanwu Lab (xlab.tencent.com) Entry added September 20, 2021
Sandbox Available for: macOS Big Sur Impact: A user may gain access to protected parts of the file system Description: An access issue was addressed with improved access restrictions. CVE-2021-30850: an anonymous researcher Entry added September 20, 2021
SMB Available for: macOS Big Sur Impact: A local user may be able to read kernel memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2021-30845: Peter Nguyen Vu Hoang of STAR Labs Entry added September 20, 2021
SMB Available for: macOS Big Sur Impact: A remote attacker may be able to leak memory Description: A logic issue was addressed with improved state management. CVE-2021-30858: an anonymous researcher
Additional recognition
APFS We would like to acknowledge Koh M. Nakagawa of FFRI Security, Inc. for their assistance. Entry added September 20, 2021
App Support We would like to acknowledge @CodeColorist, an anonymous researcher for their assistance. Entry added September 20, 2021
CoreML We would like to acknowledge hjy79425575 working with Trend Micro Zero Day Initiative for their assistance. Entry added September 20, 2021
CUPS We would like to acknowledge an anonymous researcher for their assistance. Entry added September 20, 2021
Kernel We would like to acknowledge Anthony Steinhauser of Google's Safeside project for their assistance. Entry added September 20, 2021
Sandbox We would like to acknowledge Csaba Fitzl (@theevilbit) of Offensive Security for their assistance. Entry added September 20, 2021
smbx We would like to acknowledge Zhongcheng Li (CK01) for their assistance. Entry added September 20, 2021
Installation note:
This update may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEePiLW1MrMjw19XzoeC9qKD1prhgFAmFI888ACgkQeC9qKD1p rhi/Bg/9GiqXl8sxPjDpATJqneZ1GcAxWxBZgkFrcLV/cMwrVqniWsOeVHqHjMSY eJUkGehUtKsYE0g8Uk0qJqOUl3dxxGJpIDytOQJB3TFdd1BpZSK/tOChVem1JV1B +CMhqDnmR/u7bLqfCr1p6J5QJNHjTjgBA4RthdzZZ52pLGql7/2qfaJwpeHkheS4 5EKmch8zh0CGRqrUTg1HgY67ierNsz47jIU6n7UeMwjskRU3xM9VqJ9s4eKGAtSv 4Ry16pv0xUZ4cmL5EiLm2/eFbY8ByCji7jYPP0POBO4l518TGpaX2PaZBP9v0rrD t6cPEZHnsRaZ49OYak6z9iA8teKGSs6aCMuzSxExvlT8+YySf1o1nefbRH/tZMfn bwSO0ZyPsS9WYyuG/zX08U3CKOTkjqhLaOwVwte+cAeg2QS85aa9XPMG6PKcpyfu R7auxS92+Dg+R+97dAsI9TprSutCTw4iY8lyK9MVJSnh+zQSZEihUh4EaSufTHRC NlOSHvsTfXqsHaeed6sVKyX4ADHCUvRbCCIrqJKUs6waNd2T2XF7SzvgTSDJMHU9 4AL/jpnltTjDJTtMO999VZKNzYurrGiHvBs5zHWr91+eaHW8YGdsDERsX3BFYLe3 85i+Yge0iXlP7mT32cWxIw4AWDFITFiHnmV1/cdsCd2GIkqkhFw= =9bjT -----END PGP SIGNATURE-----
. 8) - aarch64, ppc64le, s390x, x86_64
Bug Fix(es):
-
WebProcess::initializeWebProcess crashing on aarch64 (BZ#2010825)
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: webkitgtk4 security update Advisory ID: RHSA-2022:0059-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:0059 Issue date: 2022-01-11 CVE Names: CVE-2021-30858 ==================================================================== 1. Summary:
An update for webkitgtk4 is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, s390x Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch
- Description:
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
- webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30858)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: webkitgtk4-2.28.2-3.el7.src.rpm
x86_64: webkitgtk4-2.28.2-3.el7.i686.rpm webkitgtk4-2.28.2-3.el7.x86_64.rpm webkitgtk4-debuginfo-2.28.2-3.el7.i686.rpm webkitgtk4-debuginfo-2.28.2-3.el7.x86_64.rpm webkitgtk4-jsc-2.28.2-3.el7.i686.rpm webkitgtk4-jsc-2.28.2-3.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
noarch: webkitgtk4-doc-2.28.2-3.el7.noarch.rpm
x86_64: webkitgtk4-debuginfo-2.28.2-3.el7.i686.rpm webkitgtk4-debuginfo-2.28.2-3.el7.x86_64.rpm webkitgtk4-devel-2.28.2-3.el7.i686.rpm webkitgtk4-devel-2.28.2-3.el7.x86_64.rpm webkitgtk4-jsc-devel-2.28.2-3.el7.i686.rpm webkitgtk4-jsc-devel-2.28.2-3.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: webkitgtk4-2.28.2-3.el7.src.rpm
x86_64: webkitgtk4-2.28.2-3.el7.i686.rpm webkitgtk4-2.28.2-3.el7.x86_64.rpm webkitgtk4-debuginfo-2.28.2-3.el7.i686.rpm webkitgtk4-debuginfo-2.28.2-3.el7.x86_64.rpm webkitgtk4-jsc-2.28.2-3.el7.i686.rpm webkitgtk4-jsc-2.28.2-3.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
noarch: webkitgtk4-doc-2.28.2-3.el7.noarch.rpm
x86_64: webkitgtk4-debuginfo-2.28.2-3.el7.i686.rpm webkitgtk4-debuginfo-2.28.2-3.el7.x86_64.rpm webkitgtk4-devel-2.28.2-3.el7.i686.rpm webkitgtk4-devel-2.28.2-3.el7.x86_64.rpm webkitgtk4-jsc-devel-2.28.2-3.el7.i686.rpm webkitgtk4-jsc-devel-2.28.2-3.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: webkitgtk4-2.28.2-3.el7.src.rpm
ppc64: webkitgtk4-2.28.2-3.el7.ppc.rpm webkitgtk4-2.28.2-3.el7.ppc64.rpm webkitgtk4-debuginfo-2.28.2-3.el7.ppc.rpm webkitgtk4-debuginfo-2.28.2-3.el7.ppc64.rpm webkitgtk4-jsc-2.28.2-3.el7.ppc.rpm webkitgtk4-jsc-2.28.2-3.el7.ppc64.rpm
ppc64le: webkitgtk4-2.28.2-3.el7.ppc64le.rpm webkitgtk4-debuginfo-2.28.2-3.el7.ppc64le.rpm webkitgtk4-devel-2.28.2-3.el7.ppc64le.rpm webkitgtk4-jsc-2.28.2-3.el7.ppc64le.rpm webkitgtk4-jsc-devel-2.28.2-3.el7.ppc64le.rpm
s390x: webkitgtk4-2.28.2-3.el7.s390.rpm webkitgtk4-2.28.2-3.el7.s390x.rpm webkitgtk4-debuginfo-2.28.2-3.el7.s390.rpm webkitgtk4-debuginfo-2.28.2-3.el7.s390x.rpm webkitgtk4-jsc-2.28.2-3.el7.s390.rpm webkitgtk4-jsc-2.28.2-3.el7.s390x.rpm
x86_64: webkitgtk4-2.28.2-3.el7.i686.rpm webkitgtk4-2.28.2-3.el7.x86_64.rpm webkitgtk4-debuginfo-2.28.2-3.el7.i686.rpm webkitgtk4-debuginfo-2.28.2-3.el7.x86_64.rpm webkitgtk4-devel-2.28.2-3.el7.i686.rpm webkitgtk4-devel-2.28.2-3.el7.x86_64.rpm webkitgtk4-jsc-2.28.2-3.el7.i686.rpm webkitgtk4-jsc-2.28.2-3.el7.x86_64.rpm webkitgtk4-jsc-devel-2.28.2-3.el7.i686.rpm webkitgtk4-jsc-devel-2.28.2-3.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch: webkitgtk4-doc-2.28.2-3.el7.noarch.rpm
ppc64: webkitgtk4-debuginfo-2.28.2-3.el7.ppc.rpm webkitgtk4-debuginfo-2.28.2-3.el7.ppc64.rpm webkitgtk4-devel-2.28.2-3.el7.ppc.rpm webkitgtk4-devel-2.28.2-3.el7.ppc64.rpm webkitgtk4-jsc-devel-2.28.2-3.el7.ppc.rpm webkitgtk4-jsc-devel-2.28.2-3.el7.ppc64.rpm
s390x: webkitgtk4-debuginfo-2.28.2-3.el7.s390.rpm webkitgtk4-debuginfo-2.28.2-3.el7.s390x.rpm webkitgtk4-devel-2.28.2-3.el7.s390.rpm webkitgtk4-devel-2.28.2-3.el7.s390x.rpm webkitgtk4-jsc-devel-2.28.2-3.el7.s390.rpm webkitgtk4-jsc-devel-2.28.2-3.el7.s390x.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: webkitgtk4-2.28.2-3.el7.src.rpm
x86_64: webkitgtk4-2.28.2-3.el7.i686.rpm webkitgtk4-2.28.2-3.el7.x86_64.rpm webkitgtk4-debuginfo-2.28.2-3.el7.i686.rpm webkitgtk4-debuginfo-2.28.2-3.el7.x86_64.rpm webkitgtk4-devel-2.28.2-3.el7.i686.rpm webkitgtk4-devel-2.28.2-3.el7.x86_64.rpm webkitgtk4-jsc-2.28.2-3.el7.i686.rpm webkitgtk4-jsc-2.28.2-3.el7.x86_64.rpm webkitgtk4-jsc-devel-2.28.2-3.el7.i686.rpm webkitgtk4-jsc-devel-2.28.2-3.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch: webkitgtk4-doc-2.28.2-3.el7.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2021-30858 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYd37ddzjgjWX9erEAQjIBw//X0CWLozcqp62pyxvvZD/fpR7OK8ux/kO jIhtCKZdBwK8SaLcLRvFrNvOb/qY3AZa/XbPQjzaKztuWplxDU2LZBz74mngWEW0 r43dWUacOBZq0mbNek5WiInippBLDVDlDzg8X6qwTpH6Z9EqY6EtX9ZzrXtwOthI alOkbYIVJg/4Wkrp8gXyupgT934OyEQfZkrR1SUbxlhKjdfFx7vgeqz3+G7odT75 90MTCo0Vo6XgDOS7j5xjrwQU05vtgvRJH8/OMauSyAzYQ+qPvwJP76CGC7SphGhR LzUWlk5MaCiAGalb9FFK8A4cx8dUv0VAVOP74IZs6IUjpjz4FzSmpnAfZk1xLgyQ SJ7NS1pH2zED20eo5qgSMDvfsPw9igD0DwN29cyPi9IVbLIFjdB4+42yCK6WKOyu l31tVQBHQAbOf7ArUQQdoA7pEGzibEdy3brUbQu4Bv4LCMB2zJpLOFxTzEdp0xyz RYAxA+A8+1brMlvGh8v4wmfAxTvWXuecCnG/ilyXOq1FFQq86CBmj9Da9jLB1VuP S9xKEazAcAdrxivE53wQfUt7HurjJgtjTvUCtDPCiNYZ3617vgd29ep0PtN2EAIe ADXxd0twQIQA84Cjx5TGJgrWoU/dNLFvJFQ72Wkk5Qc0R2ZEnvBYN8ylDPTDLW0s SM2WAjGpY2M=kSrx -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce .
For the stable distribution (bullseye), this problem has been fixed in version 2.32.4-1~deb11u1.
We recommend that you upgrade your wpewebkit packages
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2172", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "iphone os", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "12.5.5" }, { "model": "ipados", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "14.8" }, { "model": "iphone os", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "14.8" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "11.0" }, { "model": "ipados", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "13.1" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "34" }, { "model": "macos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "11.6" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "33" }, { "model": "iphone os", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "13.0" }, { "model": "ipados", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "ios", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "fedora", "scope": null, "trust": 0.8, "vendor": "fedora", "version": null }, { "model": "macos", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "11.6" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-021227" }, { "db": "NVD", "id": "CVE-2021-30858" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.6", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.8", "versionStartIncluding": "13.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.8", "versionStartIncluding": "13.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.5.5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-30858" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "164982" }, { "db": "PACKETSTORM", "id": "164748" }, { "db": "PACKETSTORM", "id": "165517" } ], "trust": 0.3 }, "cve": "CVE-2021-30858", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-30858", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-390591", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-30858", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-30858", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-1951", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-390591", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-30858", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-390591" }, { "db": "VULMON", "id": "CVE-2021-30858" }, { "db": "JVNDB", "id": "JVNDB-2021-021227" }, { "db": "CNNVD", "id": "CNNVD-202108-1951" }, { "db": "NVD", "id": "CVE-2021-30858" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. apple\u0027s iPadOS Products from multiple vendors, including Microsoft, contain freed memory usage vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Updates are Available for iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation). ==========================================================================\nUbuntu Security Notice USN-5087-1\nSeptember 22, 2021\n\nwebkit2gtk vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 21.04\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in WebKitGTK. If a user were tricked into viewing a malicious\nwebsite, a remote attacker could exploit a variety of issues related to web\nbrowser security, including cross-site scripting attacks, denial of service\nattacks, and arbitrary code execution. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 21.04:\n libjavascriptcoregtk-4.0-18 2.32.4-0ubuntu0.21.04.1\n libwebkit2gtk-4.0-37 2.32.4-0ubuntu0.21.04.1\n\nUbuntu 20.04 LTS:\n libjavascriptcoregtk-4.0-18 2.32.4-0ubuntu0.20.04.1\n libwebkit2gtk-4.0-37 2.32.4-0ubuntu0.20.04.1\n\nUbuntu 18.04 LTS:\n libjavascriptcoregtk-4.0-18 2.32.4-0ubuntu0.18.04.1\n libwebkit2gtk-4.0-37 2.32.4-0ubuntu0.18.04.1\n\nThis update uses a new upstream release, which includes additional bug\nfixes. After a standard system update you need to restart any applications\nthat use WebKitGTK, such as Epiphany, to make all the necessary changes. \nInformation about the security content is also available at\nhttps://support.apple.com/HT212804. \nDescription: An integer overflow was addressed with improved input\nvalidation. \nCVE-2021-30860: The Citizen Lab\n\nCUPS\nAvailable for: macOS Big Sur\nImpact: A local attacker may be able to elevate their privileges\nDescription: A permissions issue existed. \nCVE-2021-30827: an anonymous researcher\nEntry added September 20, 2021\n\nCUPS\nAvailable for: macOS Big Sur\nImpact: A local user may be able to read arbitrary files as root\nDescription: This issue was addressed with improved checks. \nCVE-2021-30828: an anonymous researcher\nEntry added September 20, 2021\n\nCUPS\nAvailable for: macOS Big Sur\nImpact: A local user may be able to execute arbitrary files\nDescription: A URI parsing issue was addressed with improved parsing. \nCVE-2021-30829: an anonymous researcher\nEntry added September 20, 2021\n\ncurl\nAvailable for: macOS Big Sur\nImpact: curl could potentially reveal sensitive internal information\nto the server using a clear-text network protocol\nDescription: A buffer overflow was addressed with improved input\nvalidation. \nCVE-2021-22925\nEntry added September 20, 2021\n\nCVMS\nAvailable for: macOS Big Sur\nImpact: A local attacker may be able to elevate their privileges\nDescription: A memory corruption issue was addressed with improved\nstate management. \nCVE-2021-30832: Mickey Jin (@patch1t) of Trend Micro\nEntry added September 20, 2021\n\nFontParser\nAvailable for: macOS Big Sur\nImpact: Processing a maliciously crafted dfont file may lead to\narbitrary code execution\nDescription: This issue was addressed with improved checks. \nCVE-2021-30841: Xingwei Lin of Ant Security Light-Year Lab\nCVE-2021-30842: Xingwei Lin of Ant Security Light-Year Lab\nCVE-2021-30843: Xingwei Lin of Ant Security Light-Year Lab\nEntry added September 20, 2021\n\nGatekeeper\nAvailable for: macOS Big Sur\nImpact: A malicious application may bypass Gatekeeper checks\nDescription: This issue was addressed with improved checks. \nCVE-2021-30853: Gordon Long (@ethicalhax) of Box, Inc. \nCVE-2021-30847: Mike Zhang of Pangu Lab\nEntry added September 20, 2021\n\nKernel\nAvailable for: macOS Big Sur\nImpact: A malicious application may be able to execute arbitrary code\nwith kernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2021-30830: Zweig of Kunlun Lab\nEntry added September 20, 2021\n\nKernel\nAvailable for: macOS Big Sur\nImpact: A malicious application may be able to execute arbitrary code\nwith kernel privileges\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2021-30865: Zweig of Kunlun Lab\nEntry added September 20, 2021\n\nKernel\nAvailable for: macOS Big Sur\nImpact: A malicious application may be able to execute arbitrary code\nwith kernel privileges\nDescription: A race condition was addressed with improved locking. \nCVE-2021-30857: Zweig of Kunlun Lab\nEntry added September 20, 2021\n\nKernel\nAvailable for: macOS Big Sur\nImpact: A malicious application may be able to execute arbitrary code\nwith kernel privileges\nDescription: A type confusion issue was addressed with improved state\nhandling. \nCVE-2021-30859: Apple\nEntry added September 20, 2021\n\nlibexpat\nAvailable for: macOS Big Sur\nImpact: A remote attacker may be able to cause a denial of service\nDescription: This issue was addressed by updating expat to version\n2.4.1. \nCVE-2013-0340: an anonymous researcher\nEntry added September 20, 2021\n\nPreferences\nAvailable for: macOS Big Sur\nImpact: An application may be able to access restricted files\nDescription: A validation issue existed in the handling of symlinks. \nCVE-2021-30855: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020)\nof Tencent Security Xuanwu Lab (xlab.tencent.com)\nEntry added September 20, 2021\n\nSandbox\nAvailable for: macOS Big Sur\nImpact: A user may gain access to protected parts of the file system\nDescription: An access issue was addressed with improved access\nrestrictions. \nCVE-2021-30850: an anonymous researcher\nEntry added September 20, 2021\n\nSMB\nAvailable for: macOS Big Sur\nImpact: A local user may be able to read kernel memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2021-30845: Peter Nguyen Vu Hoang of STAR Labs\nEntry added September 20, 2021\n\nSMB\nAvailable for: macOS Big Sur\nImpact: A remote attacker may be able to leak memory\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2021-30858: an anonymous researcher\n\nAdditional recognition\n\nAPFS\nWe would like to acknowledge Koh M. Nakagawa of FFRI Security, Inc. \nfor their assistance. \nEntry added September 20, 2021\n\nApp Support\nWe would like to acknowledge @CodeColorist, an anonymous researcher\nfor their assistance. \nEntry added September 20, 2021\n\nCoreML\nWe would like to acknowledge hjy79425575 working with Trend Micro\nZero Day Initiative for their assistance. \nEntry added September 20, 2021\n\nCUPS\nWe would like to acknowledge an anonymous researcher for their\nassistance. \nEntry added September 20, 2021\n\nKernel\nWe would like to acknowledge Anthony Steinhauser of Google\u0027s Safeside\nproject for their assistance. \nEntry added September 20, 2021\n\nSandbox\nWe would like to acknowledge Csaba Fitzl (@theevilbit) of Offensive\nSecurity for their assistance. \nEntry added September 20, 2021\n\nsmbx\nWe would like to acknowledge Zhongcheng Li (CK01) for their\nassistance. \nEntry added September 20, 2021\n\nInstallation note:\n\nThis update may be obtained from the Mac App Store or\nApple\u0027s Software Downloads web site:\nhttps://support.apple.com/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\n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\n85i+Yge0iXlP7mT32cWxIw4AWDFITFiHnmV1/cdsCd2GIkqkhFw=\n=9bjT\n-----END PGP SIGNATURE-----\n\n\n\n. 8) - aarch64, ppc64le, s390x, x86_64\n\n3. \n\nBug Fix(es):\n\n* WebProcess::initializeWebProcess crashing on aarch64 (BZ#2010825)\n\n4. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Moderate: webkitgtk4 security update\nAdvisory ID: RHSA-2022:0059-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2022:0059\nIssue date: 2022-01-11\nCVE Names: CVE-2021-30858\n====================================================================\n1. Summary:\n\nAn update for webkitgtk4 is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, s390x\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - noarch\n\n3. Description:\n\nWebKitGTK is the port of the portable web rendering engine WebKit to the\nGTK platform. \n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free leading to arbitrary code execution\n(CVE-2021-30858)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nwebkitgtk4-2.28.2-3.el7.src.rpm\n\nx86_64:\nwebkitgtk4-2.28.2-3.el7.i686.rpm\nwebkitgtk4-2.28.2-3.el7.x86_64.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.i686.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.x86_64.rpm\nwebkitgtk4-jsc-2.28.2-3.el7.i686.rpm\nwebkitgtk4-jsc-2.28.2-3.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nnoarch:\nwebkitgtk4-doc-2.28.2-3.el7.noarch.rpm\n\nx86_64:\nwebkitgtk4-debuginfo-2.28.2-3.el7.i686.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.x86_64.rpm\nwebkitgtk4-devel-2.28.2-3.el7.i686.rpm\nwebkitgtk4-devel-2.28.2-3.el7.x86_64.rpm\nwebkitgtk4-jsc-devel-2.28.2-3.el7.i686.rpm\nwebkitgtk4-jsc-devel-2.28.2-3.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nwebkitgtk4-2.28.2-3.el7.src.rpm\n\nx86_64:\nwebkitgtk4-2.28.2-3.el7.i686.rpm\nwebkitgtk4-2.28.2-3.el7.x86_64.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.i686.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.x86_64.rpm\nwebkitgtk4-jsc-2.28.2-3.el7.i686.rpm\nwebkitgtk4-jsc-2.28.2-3.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nnoarch:\nwebkitgtk4-doc-2.28.2-3.el7.noarch.rpm\n\nx86_64:\nwebkitgtk4-debuginfo-2.28.2-3.el7.i686.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.x86_64.rpm\nwebkitgtk4-devel-2.28.2-3.el7.i686.rpm\nwebkitgtk4-devel-2.28.2-3.el7.x86_64.rpm\nwebkitgtk4-jsc-devel-2.28.2-3.el7.i686.rpm\nwebkitgtk4-jsc-devel-2.28.2-3.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nwebkitgtk4-2.28.2-3.el7.src.rpm\n\nppc64:\nwebkitgtk4-2.28.2-3.el7.ppc.rpm\nwebkitgtk4-2.28.2-3.el7.ppc64.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.ppc.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.ppc64.rpm\nwebkitgtk4-jsc-2.28.2-3.el7.ppc.rpm\nwebkitgtk4-jsc-2.28.2-3.el7.ppc64.rpm\n\nppc64le:\nwebkitgtk4-2.28.2-3.el7.ppc64le.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.ppc64le.rpm\nwebkitgtk4-devel-2.28.2-3.el7.ppc64le.rpm\nwebkitgtk4-jsc-2.28.2-3.el7.ppc64le.rpm\nwebkitgtk4-jsc-devel-2.28.2-3.el7.ppc64le.rpm\n\ns390x:\nwebkitgtk4-2.28.2-3.el7.s390.rpm\nwebkitgtk4-2.28.2-3.el7.s390x.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.s390.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.s390x.rpm\nwebkitgtk4-jsc-2.28.2-3.el7.s390.rpm\nwebkitgtk4-jsc-2.28.2-3.el7.s390x.rpm\n\nx86_64:\nwebkitgtk4-2.28.2-3.el7.i686.rpm\nwebkitgtk4-2.28.2-3.el7.x86_64.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.i686.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.x86_64.rpm\nwebkitgtk4-devel-2.28.2-3.el7.i686.rpm\nwebkitgtk4-devel-2.28.2-3.el7.x86_64.rpm\nwebkitgtk4-jsc-2.28.2-3.el7.i686.rpm\nwebkitgtk4-jsc-2.28.2-3.el7.x86_64.rpm\nwebkitgtk4-jsc-devel-2.28.2-3.el7.i686.rpm\nwebkitgtk4-jsc-devel-2.28.2-3.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nnoarch:\nwebkitgtk4-doc-2.28.2-3.el7.noarch.rpm\n\nppc64:\nwebkitgtk4-debuginfo-2.28.2-3.el7.ppc.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.ppc64.rpm\nwebkitgtk4-devel-2.28.2-3.el7.ppc.rpm\nwebkitgtk4-devel-2.28.2-3.el7.ppc64.rpm\nwebkitgtk4-jsc-devel-2.28.2-3.el7.ppc.rpm\nwebkitgtk4-jsc-devel-2.28.2-3.el7.ppc64.rpm\n\ns390x:\nwebkitgtk4-debuginfo-2.28.2-3.el7.s390.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.s390x.rpm\nwebkitgtk4-devel-2.28.2-3.el7.s390.rpm\nwebkitgtk4-devel-2.28.2-3.el7.s390x.rpm\nwebkitgtk4-jsc-devel-2.28.2-3.el7.s390.rpm\nwebkitgtk4-jsc-devel-2.28.2-3.el7.s390x.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nwebkitgtk4-2.28.2-3.el7.src.rpm\n\nx86_64:\nwebkitgtk4-2.28.2-3.el7.i686.rpm\nwebkitgtk4-2.28.2-3.el7.x86_64.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.i686.rpm\nwebkitgtk4-debuginfo-2.28.2-3.el7.x86_64.rpm\nwebkitgtk4-devel-2.28.2-3.el7.i686.rpm\nwebkitgtk4-devel-2.28.2-3.el7.x86_64.rpm\nwebkitgtk4-jsc-2.28.2-3.el7.i686.rpm\nwebkitgtk4-jsc-2.28.2-3.el7.x86_64.rpm\nwebkitgtk4-jsc-devel-2.28.2-3.el7.i686.rpm\nwebkitgtk4-jsc-devel-2.28.2-3.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nnoarch:\nwebkitgtk4-doc-2.28.2-3.el7.noarch.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2021-30858\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2022 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nSM2WAjGpY2M=kSrx\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nFor the stable distribution (bullseye), this problem has been fixed in\nversion 2.32.4-1~deb11u1. \n\nWe recommend that you upgrade your wpewebkit packages", "sources": [ { "db": "NVD", "id": "CVE-2021-30858" }, { "db": "JVNDB", "id": "JVNDB-2021-021227" }, { "db": "VULHUB", "id": "VHN-390591" }, { "db": "VULMON", "id": "CVE-2021-30858" }, { "db": "PACKETSTORM", "id": "164262" }, { "db": "PACKETSTORM", "id": "164246" }, { "db": "PACKETSTORM", "id": "164201" }, { "db": "PACKETSTORM", "id": "164982" }, { "db": "PACKETSTORM", "id": "164748" }, { "db": "PACKETSTORM", "id": "165517" }, { "db": "PACKETSTORM", "id": "169117" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-30858", "trust": 4.1 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2021/09/20/1", "trust": 2.6 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2021/10/27/4", "trust": 2.6 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2021/10/27/2", "trust": 2.6 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2021/10/26/9", "trust": 2.6 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2021/10/27/1", "trust": 2.6 }, { "db": "PACKETSTORM", "id": "164982", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "164748", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-021227", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "165524", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "164262", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "164201", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2021092018", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022011153", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021111716", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021092803", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022011401", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021091322", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021092317", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021110314", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021100415", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "164242", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "164277", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3103", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3333", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3161", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3400", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3654", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3212", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0100", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3914", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3198", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0382", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202108-1951", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "165517", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-390591", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-30858", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164246", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "169117", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-390591" }, { "db": "VULMON", "id": "CVE-2021-30858" }, { "db": "JVNDB", "id": "JVNDB-2021-021227" }, { "db": "PACKETSTORM", "id": "164262" }, { "db": "PACKETSTORM", "id": "164246" }, { "db": "PACKETSTORM", "id": "164201" }, { "db": "PACKETSTORM", "id": "164982" }, { "db": "PACKETSTORM", "id": "164748" }, { "db": "PACKETSTORM", "id": "165517" }, { "db": "PACKETSTORM", "id": "169117" }, { "db": "CNNVD", "id": "CNNVD-202108-1951" }, { "db": "NVD", "id": "CVE-2021-30858" } ] }, "id": "VAR-202108-2172", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-390591" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T21:52:30.241000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT212807 Apple\u00a0 Security update", "trust": 0.8, "url": "https://www.debian.org/security/2021/dsa-4975" }, { "title": "Apple macOS Big Sur Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=162838" }, { "title": "Debian Security Advisories: DSA-4975-1 webkit2gtk -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=5db54186925e9bf1d208a2b11e299b67" }, { "title": "Debian Security Advisories: DSA-4976-1 wpewebkit -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=5da73458bc4c1bfc6b9037e64c70793c" }, { "title": "Red Hat: CVE-2021-30858", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2021-30858" }, { "title": "Amazon Linux 2: ALAS2-2022-1747", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2-2022-1747" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=cve-2021-30858 log" }, { "title": "Amazon Linux 2022: ALAS2022-2022-015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022\u0026qid=alas2022-2022-015" }, { "title": "CVE-202130858 (Intended for testing on an Apple iOS device or a Sony Playstation 4 of any flavor)", "trust": 0.1, "url": "https://github.com/fitterminator/cve-202130858 " }, { "title": "CVEREV3", "trust": 0.1, "url": "https://github.com/kameleonreloaded/cverev3 " }, { "title": "CVE-202130858 (Intended for testing on an Apple iOS device or a Sony Playstation 4 of any flavor)", "trust": 0.1, "url": "https://github.com/fitterminator/ps4-cve-202130858 " }, { "title": "PS4CVE202130858", "trust": 0.1, "url": "https://github.com/nazky/ps4cve202130858 " }, { "title": "https://github.com/ChendoChap/PS5-Webkit-Execution", "trust": 0.1, "url": "https://github.com/chendochap/ps5-webkit-execution " }, { "title": "NIST Bulk CVE Lookup by Jay Chen\nSample output", "trust": 0.1, "url": "https://github.com/jaychen2/nist-bulk-cve-lookup " }, { "title": "Known Exploited Vulnerabilities Detector", "trust": 0.1, "url": "https://github.com/ostorlab/kev " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/apple-patches-zero-days-attack/174988/" }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2021/09/13/apple_ios_macos_security_fixes/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-30858" }, { "db": "JVNDB", "id": "JVNDB-2021-021227" }, { "db": "CNNVD", "id": "CNNVD-202108-1951" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-390591" }, { "db": "JVNDB", "id": "JVNDB-2021-021227" }, { "db": "NVD", "id": "CVE-2021-30858" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://seclists.org/fulldisclosure/2021/sep/25" }, { "trust": 2.6, "url": "http://seclists.org/fulldisclosure/2021/sep/27" }, { "trust": 2.6, "url": "http://seclists.org/fulldisclosure/2021/sep/29" }, { "trust": 2.6, "url": "http://seclists.org/fulldisclosure/2021/sep/38" }, { "trust": 2.6, "url": "http://seclists.org/fulldisclosure/2021/sep/39" }, { "trust": 2.6, "url": "http://seclists.org/fulldisclosure/2021/sep/50" }, { "trust": 2.6, "url": "http://www.openwall.com/lists/oss-security/2021/09/20/1" }, { "trust": 2.6, "url": "http://www.openwall.com/lists/oss-security/2021/10/26/9" }, { "trust": 2.6, "url": "http://www.openwall.com/lists/oss-security/2021/10/27/1" }, { "trust": 2.6, "url": "http://www.openwall.com/lists/oss-security/2021/10/27/2" }, { "trust": 2.6, "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4" }, { "trust": 2.4, "url": "https://support.apple.com/en-us/ht212804" }, { "trust": 1.9, "url": "https://www.debian.org/security/2021/dsa-4975" }, { "trust": 1.9, "url": "https://support.apple.com/en-us/ht212807" }, { "trust": 1.8, "url": "https://support.apple.com/kb/ht212824" }, { "trust": 1.8, "url": "https://www.debian.org/security/2021/dsa-4976" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30858" }, { "trust": 1.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/bo6dmthzr57jdboxpsnr2mkdmcrwv265/" }, { "trust": 1.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/xynv7ask4lqvaumjxnxbs3z7rvdq2n3w/" }, { "trust": 0.9, "url": "https://access.redhat.com/security/cve/cve-2021-30858" }, { "trust": 0.8, "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/bo6dmthzr57jdboxpsnr2mkdmcrwv265/" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/xynv7ask4lqvaumjxnxbs3z7rvdq2n3w/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0100" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0382" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021111716" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021091322" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/webkitgtk-wpe-webkit-multiple-vulnerabilities-36750" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022011401" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3198" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3654" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/apple-macos-two-vulnerabilities-36384" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021092803" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3212" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3333" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164242/apple-security-advisory-2021-09-20-6.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164262/ubuntu-security-notice-usn-5087-1.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164277/apple-security-advisory-2021-09-23-1.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164982/red-hat-security-advisory-2021-4686-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3914" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164201/apple-security-advisory-2021-09-13-5.html" }, { "trust": 0.6, "url": "https://support.apple.com/en-us/ht212824" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021110314" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021092317" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021092018" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021100415" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3103" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3400" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164748/red-hat-security-advisory-2021-4097-01.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022011153" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/165524/red-hat-security-advisory-2022-0075-03.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3161" }, { "trust": 0.3, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.3, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.2, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "trust": 0.1, "url": "https://github.com/fitterminator/cve-202130858" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://alas.aws.amazon.com/al2/alas-2022-1747.html" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-5087-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/webkit2gtk/2.32.4-0ubuntu0.18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/webkit2gtk/2.32.4-0ubuntu0.21.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/webkit2gtk/2.32.4-0ubuntu0.20.04.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22925" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30830" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30828" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0340" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30841" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30855" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30843" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30844" }, { "trust": 0.1, "url": "https://support.apple.com/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30859" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30829" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30853" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30857" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30845" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30850" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30865" }, { "trust": 0.1, "url": "https://support.apple.com/ht212804." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30847" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30842" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30860" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30827" }, { "trust": 0.1, "url": "https://support.apple.com/ht212808." }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:4686" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:4097" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2022:0059" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/wpewebkit" }, { "trust": 0.1, "url": "https://www.debian.org/security/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-390591" }, { "db": "VULMON", "id": "CVE-2021-30858" }, { "db": "JVNDB", "id": "JVNDB-2021-021227" }, { "db": "PACKETSTORM", "id": "164262" }, { "db": "PACKETSTORM", "id": "164246" }, { "db": "PACKETSTORM", "id": "164201" }, { "db": "PACKETSTORM", "id": "164982" }, { "db": "PACKETSTORM", "id": "164748" }, { "db": "PACKETSTORM", "id": "165517" }, { "db": "PACKETSTORM", "id": "169117" }, { "db": "CNNVD", "id": "CNNVD-202108-1951" }, { "db": "NVD", "id": "CVE-2021-30858" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-390591" }, { "db": "VULMON", "id": "CVE-2021-30858" }, { "db": "JVNDB", "id": "JVNDB-2021-021227" }, { "db": "PACKETSTORM", "id": "164262" }, { "db": "PACKETSTORM", "id": "164246" }, { "db": "PACKETSTORM", "id": "164201" }, { "db": "PACKETSTORM", "id": "164982" }, { "db": "PACKETSTORM", "id": "164748" }, { "db": "PACKETSTORM", "id": "165517" }, { "db": "PACKETSTORM", "id": "169117" }, { "db": "CNNVD", "id": "CNNVD-202108-1951" }, { "db": "NVD", "id": "CVE-2021-30858" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-24T00:00:00", "db": "VULHUB", "id": "VHN-390591" }, { "date": "2021-08-24T00:00:00", "db": "VULMON", "id": "CVE-2021-30858" }, { "date": "2024-07-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-021227" }, { "date": "2021-09-23T15:31:26", "db": "PACKETSTORM", "id": "164262" }, { "date": "2021-09-22T16:33:18", "db": "PACKETSTORM", "id": "164246" }, { "date": "2021-09-20T16:03:26", "db": "PACKETSTORM", "id": "164201" }, { "date": "2021-11-16T15:35:40", "db": "PACKETSTORM", "id": "164982" }, { "date": "2021-11-02T15:42:50", "db": "PACKETSTORM", "id": "164748" }, { "date": "2022-01-12T15:37:03", "db": "PACKETSTORM", "id": "165517" }, { "date": "2021-09-28T19:12:00", "db": "PACKETSTORM", "id": "169117" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-1951" }, { "date": "2021-08-24T19:15:14.253000", "db": "NVD", "id": "CVE-2021-30858" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-03T00:00:00", "db": "VULHUB", "id": "VHN-390591" }, { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2021-30858" }, { "date": "2024-07-19T07:27:00", "db": "JVNDB", "id": "JVNDB-2021-021227" }, { "date": "2022-01-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-1951" }, { "date": "2023-11-07T03:33:33.730000", "db": "NVD", "id": "CVE-2021-30858" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "164262" }, { "db": "CNNVD", "id": "CNNVD-202108-1951" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "apple\u0027s \u00a0iPadOS\u00a0 Vulnerability related to use of freed memory in products from multiple vendors such as", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-021227" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-1951" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.