Action not permitted
Modal body text goes here.
cve-2022-21549
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
Oracle Corporation | Java SE JDK and JRE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:46:38.909Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "DSA-5192", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5192" }, { "name": "FEDORA-2022-34584d4257", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQICCJXXAYMCCXOO24R4W7Q3RSKCYDMX/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220729-0009/" }, { "name": "FEDORA-2022-64431bccec", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKJCLA2GDNF4B7ZRKORQ2TIR56AHJ4VC/" }, { "name": "GLSA-202401-25", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-25" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Java SE JDK and JRE", "vendor": "Oracle Corporation", "versions": [ { "status": "affected", "version": "Oracle Java SE:17.0.3.1" }, { "status": "affected", "version": "Oracle GraalVM Enterprise Edition:21.3.2" }, { "status": "affected", "version": "Oracle GraalVM Enterprise Edition:22.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-17T15:06:19.501295", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "DSA-5192", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5192" }, { "name": "FEDORA-2022-34584d4257", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQICCJXXAYMCCXOO24R4W7Q3RSKCYDMX/" }, { "url": "https://security.netapp.com/advisory/ntap-20220729-0009/" }, { "name": "FEDORA-2022-64431bccec", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKJCLA2GDNF4B7ZRKORQ2TIR56AHJ4VC/" }, { "name": "GLSA-202401-25", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202401-25" } ] } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2022-21549", "datePublished": "2022-07-19T00:00:00", "dateReserved": "2021-11-15T00:00:00", "dateUpdated": "2024-08-03T02:46:38.909Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-21549\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2022-07-19T22:15:12.147\",\"lastModified\":\"2024-01-17T15:15:08.940\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Libraries). Las versiones afectadas son Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 y 22.1.0. La vulnerabilidad f\u00e1cilmente explotable permite a un atacante no autenticado con acceso a la red por medio de m\u00faltiples protocolos comprometer a Oracle Java SE, Oracle GraalVM Enterprise Edition. Los ataques con \u00e9xito de esta vulnerabilidad pueden resultar en el acceso no autorizado a la actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n de algunos de los datos accesibles de Oracle Java SE, Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad es aplicada a las implantaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start con sandbox o applets Java con sandbox, que cargan y ejecutan c\u00f3digo que no es confiable (por ejemplo, c\u00f3digo que viene de Internet) y dependen de la sandbox de Java para la seguridad. Esta vulnerabilidad tambi\u00e9n puede ser explotada mediante el uso de APIs en el componente especificado, por ejemplo, mediante un servicio web que suministra datos a las APIs. CVSS 3.1, Puntuaci\u00f3n Base 5.3 (impactos en la Integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert_us@oracle.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:21.3.2:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"601D92C4-F71F-47E2-9041-5C286D2137F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:22.1.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"B18FE85D-C53D-44E9-8992-715820D1264B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:17.0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AF3539B-0434-4310-AE88-F46864C7C20F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:17.0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DF70EEA-EC9D-4FFC-B7BE-76F50C34D999\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:17.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6302149-28AA-481E-BC6C-87D05E73768A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EF6650C-558D-45C8-AE7D-136EE70CB6D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B55E8D50-99B4-47EC-86F9-699B67D473CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCAA4004-9319-478C-9D55-0E8307F872F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0F202E8-97E6-4BBB-A0B6-4CA3F5803C08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C19813-E823-456A-B1CE-EC0684CE1953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"}]}]}],\"references\":[{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQICCJXXAYMCCXOO24R4W7Q3RSKCYDMX/\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKJCLA2GDNF4B7ZRKORQ2TIR56AHJ4VC/\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://security.gentoo.org/glsa/202401-25\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20220729-0009/\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5192\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
rhsa-2022_5757
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for Windows.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The OpenJDK 17 packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 17 (17.0.4) for Windows\nserves as a replacement for the Red Hat build of OpenJDK 17 (17.0.3) and\nincludes security and bug fixes, and enhancements. For further information,\nrefer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nOther Changes:\n\n* Red Hat builds of OpenJDK now identify themselves as such in the version output of OpenJDK tools.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5757", "url": "https://access.redhat.com/errata/RHSA-2022:5757" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5757.json" } ], "title": "Red Hat Security Advisory: OpenJDK 17.0.4 security update for Windows Builds", "tracking": { "current_release_date": "2024-11-06T01:16:40+00:00", "generator": { "date": "2024-11-06T01:16:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:5757", "initial_release_date": "2022-07-28T15:45:58+00:00", "revision_history": [ { "date": "2022-07-28T15:45:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-28T15:45:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T01:16:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Build of OpenJDK 17.0.4", "product": { "name": "Red Hat Build of OpenJDK 17.0.4", "product_id": "Red Hat Build of OpenJDK 17.0.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:openjdk:17::windows" } } } ], "category": "product_family", "name": "OpenJDK" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:45:58+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5757" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:45:58+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5757" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-21549", "cwe": { "id": "CWE-1068", "name": "Inconsistency Between Implementation and Documented Design" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108547" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: random exponentials issue (Libraries, 8283875)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "RHBZ#2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21549", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:45:58+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5757" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: random exponentials issue (Libraries, 8283875)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:45:58+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5757" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022_5758
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for portable Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The OpenJDK 17 packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 17 (17.0.4) for portable Linux\nserves as a replacement for the Red Hat build of OpenJDK 17 (17.0.3) and\nincludes security and bug fixes, and enhancements. For further information,\nrefer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nOther Changes:\n\n* Red Hat builds of OpenJDK now identify themselves as such in the version output of OpenJDK tools.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5758", "url": "https://access.redhat.com/errata/RHSA-2022:5758" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5758.json" } ], "title": "Red Hat Security Advisory: OpenJDK 17.0.4 Security Update for Portable Linux Builds", "tracking": { "current_release_date": "2024-11-06T01:16:48+00:00", "generator": { "date": "2024-11-06T01:16:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:5758", "initial_release_date": "2022-07-28T15:46:45+00:00", "revision_history": [ { "date": "2022-07-28T15:46:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-28T15:46:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T01:16:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Build of OpenJDK 17.0.4", "product": { "name": "Red Hat Build of OpenJDK 17.0.4", "product_id": "Red Hat Build of OpenJDK 17.0.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:openjdk:17" } } } ], "category": "product_family", "name": "OpenJDK" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:46:45+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_on_rhel/installing-openjdk11-on-rhel8_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:46:45+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_on_rhel/installing-openjdk11-on-rhel8_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-21549", "cwe": { "id": "CWE-1068", "name": "Inconsistency Between Implementation and Documented Design" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108547" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: random exponentials issue (Libraries, 8283875)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "RHBZ#2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21549", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:46:45+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_on_rhel/installing-openjdk11-on-rhel8_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: random exponentials issue (Libraries, 8283875)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:46:45+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_on_rhel/installing-openjdk11-on-rhel8_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022_5736
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-17-openjdk is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-17-openjdk (17.0.4.0.8). (BZ#2084779)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Previous Red Hat builds of OpenJDK 17 altered the arguments passed to sun.security.pkcs11.wrapper.PKCS11.getInstance() in order to facilitate FIPS support. This build adds an additional form of the method, retaining the original arguments, so that applications which depend on this internal method continue to function with Red Hat builds of OpenJDK. (BZ#2099919)\n\n* With previous Red Hat builds of OpenJDK 17, Mac key generation and import would fail due to the lack of the CKA_SIGN attribute on the key. This attribute is now added as part of the NSS FIPS configuration. (BZ#2105395)\n\n* With the release of Red Hat Enterprise Linux 8.6, a change was made so that disabling OpenJDK FIPS mode required the use of both the -Djava.security.disableSystemPropertiesFile=true and -Dcom.redhat.fips=false options, with the intention that FIPS mode could be controlled independently of system security properties. This change has now been reverted and only -Djava.security.disableSystemPropertiesFile=true is required to disable FIPS mode, as in Red Hat Enterprise Linux 8.4. (BZ#2107941)\n\n* Previous Red Hat builds of OpenJDK 17 running in FIPS mode with a SecurityManager would fail due to a lack of module access permissions. This has now been corrected. (BZ#2107943)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5736", "url": "https://access.redhat.com/errata/RHSA-2022:5736" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2084779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084779" }, { "category": "external", "summary": "2099919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099919" }, { "category": "external", "summary": "2105395", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105395" }, { "category": "external", "summary": "2107941", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107941" }, { "category": "external", "summary": "2107943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107943" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5736.json" } ], "title": "Red Hat Security Advisory: java-17-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-06T01:15:58+00:00", "generator": { "date": "2024-11-06T01:15:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:5736", "initial_release_date": "2022-07-27T13:22:38+00:00", "revision_history": [ { "date": "2022-07-27T13:22:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-27T13:22:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T01:15:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 9)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el9_0?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-27T13:22:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5736" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-27T13:22:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5736" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-21549", "cwe": { "id": "CWE-1068", "name": "Inconsistency Between Implementation and Documented Design" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108547" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: random exponentials issue (Libraries, 8283875)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "RHBZ#2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21549", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-27T13:22:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5736" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: random exponentials issue (Libraries, 8283875)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-27T13:22:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5736" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022_5726
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-17-openjdk (17.0.4.0.8). (BZ#2084650)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Previous Red Hat builds of OpenJDK 17 altered the arguments passed to sun.security.pkcs11.wrapper.PKCS11.getInstance() in order to facilitate FIPS support. This build adds an additional form of the method, retaining the original arguments, so that applications which depend on this internal method continue to function with Red Hat builds of OpenJDK. (BZ#2099913)\n\n* With previous Red Hat builds of OpenJDK 17, Mac key generation and import would fail due to the lack of the CKA_SIGN attribute on the key. This attribute is now added as part of the NSS FIPS configuration. (BZ#2108190)\n\n* With the release of Red Hat Enterprise Linux 8.6, a change was made so that disabling OpenJDK FIPS mode required the use of both the -Djava.security.disableSystemPropertiesFile=true and -Dcom.redhat.fips=false options, with the intention that FIPS mode could be controlled independently of system security properties. This change has now been reverted and only -Djava.security.disableSystemPropertiesFile=true is required to disable FIPS mode, as in Red Hat Enterprise Linux 8.4. (BZ#2108206)\n\n* Previous Red Hat builds of OpenJDK 17 running in FIPS mode with a SecurityManager would fail due to a lack of module access permissions. This has now been corrected. (BZ#2108209)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5726", "url": "https://access.redhat.com/errata/RHSA-2022:5726" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2084650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084650" }, { "category": "external", "summary": "2099913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099913" }, { "category": "external", "summary": "2108190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108190" }, { "category": "external", "summary": "2108206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108206" }, { "category": "external", "summary": "2108209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108209" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2109106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109106" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5726.json" } ], "title": "Red Hat Security Advisory: java-17-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-06T01:16:21+00:00", "generator": { "date": "2024-11-06T01:16:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:5726", "initial_release_date": "2022-07-26T18:26:45+00:00", "revision_history": [ { "date": "2022-07-26T18:26:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-26T18:26:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T01:16:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB (v. 8)", "product": { "name": "Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el8_6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-26T18:26:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-26T18:26:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-21549", "cwe": { "id": "CWE-1068", "name": "Inconsistency Between Implementation and Documented Design" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108547" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: random exponentials issue (Libraries, 8283875)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "RHBZ#2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21549", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-26T18:26:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: random exponentials issue (Libraries, 8283875)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-26T18:26:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
wid-sec-w-2022-0759
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0759 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0759.json" }, { "category": "self", "summary": "WID-SEC-2022-0759 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0759" }, { "category": "external", "summary": "Menu - Appendix Oracle Java SE vom 2022-07-19", "url": "https://www.oracle.com/security-alerts/cpujul2022.html#AppendixJAVA" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1824 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1824.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1823 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1823.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5683 vom 2022-07-22", "url": "http://linux.oracle.com/errata/ELSA-2022-5683.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-111 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-111.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-112 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-112.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-113 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-113.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5687 vom 2022-07-22", "url": "http://linux.oracle.com/errata/ELSA-2022-5687.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1822 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1822.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2CORRETTO8-2022-003 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASCORRETTO8-2022-003.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5696 vom 2022-07-26", "url": "https://linux.oracle.com/errata/ELSA-2022-5696.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5698 vom 2022-07-25", "url": "https://linux.oracle.com/errata/ELSA-2022-5698.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2660-1 vom 2022-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011767.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-120 vom 2022-08-05", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-120.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-119 vom 2022-08-05", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-119.html" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-127 vom 2022-08-09", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-127/index.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2898-1 vom 2022-08-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011996.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2899-1 vom 2022-08-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011995.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2949-1 vom 2022-08-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/012014.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3092-1 vom 2022-09-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5227 vom 2022-09-07", "url": "https://lists.debian.org/debian-security-announce/2022/msg00196.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1633 vom 2022-09-12", "url": "https://alas.aws.amazon.com/ALAS-2022-1633.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1835 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1835.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4166-1 vom 2022-11-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" }, { "category": "external", "summary": "Juniper Security Advisory JSA70185 vom 2023-01-12", "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US" }, { "category": "external", "summary": "IBM Security Bulletin 6856221 vom 2023-01-18", "url": "https://www.ibm.com/support/pages/node/6856221" }, { "category": "external", "summary": "IBM Security Bulletin 7014699 vom 2023-07-26", "url": "https://www.ibm.com/support/pages/node/7014699" }, { "category": "external", "summary": "IBM Security Bulletin 7140420 vom 2024-03-13", "url": "https://www.ibm.com/support/pages/node/7140420" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-16 vom 2024-05-05", "url": "https://security.gentoo.org/glsa/202405-16" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3780 vom 2024-06-10", "url": "https://access.redhat.com/errata/RHSA-2024:3780" } ], "source_lang": "en-US", "title": "Oracle Java SE: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-06-10T22:00:00.000+00:00", "generator": { "date": "2024-06-11T08:07:52.212+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0759", "initial_release_date": "2022-07-19T22:00:00.000+00:00", "revision_history": [ { "date": "2022-07-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-07-21T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux und Amazon aufgenommen" }, { "date": "2022-07-25T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-08-03T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-04T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-08-08T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2022-08-25T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-31T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-06T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-07T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-09-12T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-14T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-11-22T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Juniper aufgenommen" }, { "date": "2023-01-18T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-07-26T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-03-12T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-05-05T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-06-10T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "20" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Hitachi Command Suite", "product": { "name": "Hitachi Command Suite", "product_id": "T010951", "product_identification_helper": { "cpe": "cpe:/a:hitachi:command_suite:-" } } }, { "category": "product_name", "name": "Hitachi Configuration Manager", "product": { "name": "Hitachi Configuration Manager", "product_id": "T020304", "product_identification_helper": { "cpe": "cpe:/a:hitachi:configuration_manager:-" } } }, { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "category": "product_name", "name": "IBM InfoSphere Guardium", "product": { "name": "IBM InfoSphere Guardium", "product_id": "T002366", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_guardium:-" } } }, { "branches": [ { "category": "product_version", "name": "7.5", "product": { "name": "IBM QRadar SIEM 7.5", "product_id": "T022954", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Juniper Junos Space", "product": { "name": "Juniper Junos Space", "product_id": "T003343", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:-" } } } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11.0.15.1", "product": { "name": "Oracle Java SE 11.0.15.1", "product_id": "T023943", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:11.0.15.1" } } }, { "category": "product_version", "name": "17.0.3.1", "product": { "name": "Oracle Java SE 17.0.3.1", "product_id": "T023944", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:17.0.3.1" } } }, { "category": "product_version", "name": "21.3.2", "product": { "name": "Oracle Java SE 21.3.2", "product_id": "T023945", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:21.3.2" } } }, { "category": "product_version", "name": "22.1.0", "product": { "name": "Oracle Java SE 22.1.0", "product_id": "T023946", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:22.1.0" } } }, { "category": "product_version", "name": "7u343", "product": { "name": "Oracle Java SE 7u343", "product_id": "T023985", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:7u343" } } }, { "category": "product_version", "name": "8u333", "product": { "name": "Oracle Java SE 8u333", "product_id": "T023986", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:8u333" } } }, { "category": "product_version", "name": "18.0.1.1", "product": { "name": "Oracle Java SE 18.0.1.1", "product_id": "T023987", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:18.0.1.1" } } }, { "category": "product_version", "name": "Oracle GraalVM Enterprise Edition: 21.3.2", "product": { "name": "Oracle Java SE Oracle GraalVM Enterprise Edition: 21.3.2", "product_id": "T023989", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:oracle_graalvm_enterprise_edition_21.3.2" } } }, { "category": "product_version", "name": "Oracle GraalVM Enterprise Edition: 20.3.6", "product": { "name": "Oracle Java SE Oracle GraalVM Enterprise Edition: 20.3.6", "product_id": "T023990", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:oracle_graalvm_enterprise_edition_20.3.6" } } } ], "category": "product_name", "name": "Java SE" }, { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Oracle Java SE existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"LOW\" f\u00fcr \"Confidentiality\", sowie \"HIGH\" f\u00fcr \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T012167", "T004914", "T017562", "T022954", "T023944", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T020304", "T023986", "T023943", "T023987", "T002366", "398363", "T023990" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Oracle Java SE existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"LOW\" f\u00fcr \"Confidentiality\", sowie \"HIGH\" f\u00fcr \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T012167", "T004914", "T017562", "T022954", "T023944", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T020304", "T023986", "T023943", "T023987", "T002366", "398363", "T023990" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Oracle Java SE existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"LOW\" f\u00fcr \"Confidentiality\", sowie \"HIGH\" f\u00fcr \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T012167", "T004914", "T017562", "T022954", "T023944", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T020304", "T023986", "T023943", "T023987", "T002366", "398363", "T023990" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Oracle Java SE existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"LOW\" f\u00fcr \"Confidentiality\", sowie \"HIGH\" f\u00fcr \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T012167", "T004914", "T017562", "T022954", "T023944", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T020304", "T023986", "T023943", "T023987", "T002366", "398363", "T023990" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Java SE existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"LOW\" f\u00fcr \"Confidentiality\", sowie \"HIGH\" f\u00fcr \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T012167", "T004914", "T017562", "T022954", "T023944", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T020304", "T023986", "T023943", "T023987", "T002366", "398363", "T023990" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-34169" } ] }
wid-sec-w-2022-0746
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "OpenJDK ist eine Java Umgebung, die unter der GPLv2 ver\u00f6ffentlicht wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in OpenJDK ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0746 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0746.json" }, { "category": "self", "summary": "WID-SEC-2022-0746 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0746" }, { "category": "external", "summary": "Red Hat Bugzilla - Bug 2108540 vom 2022-07-19", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "Red Hat Bugzilla - Bug 2108543 vom 2022-07-19", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "Red Hat Bugzilla - Bug 2108547 vom 2022-07-19", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "Red Hat Bugzilla - Bug 2108554 vom 2022-07-19", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5685 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5685" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5684 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5684" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5681 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5681" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-111 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-111.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5687 vom 2022-07-22", "url": "http://linux.oracle.com/errata/ELSA-2022-5687.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-112 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-112.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-113 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-113.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5683 vom 2022-07-22", "url": "http://linux.oracle.com/errata/ELSA-2022-5683.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5687 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5687" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5683 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5683" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2CORRETTO8-2022-003 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASCORRETTO8-2022-003.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1822 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1822.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5188 vom 2022-07-22", "url": "https://lists.debian.org/debian-security-announce/2022/msg00157.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5695 vom 2022-07-26", "url": "http://linux.oracle.com/errata/ELSA-2022-5695.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5696 vom 2022-07-26", "url": "http://linux.oracle.com/errata/ELSA-2022-5696.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5698 vom 2022-07-26", "url": "http://linux.oracle.com/errata/ELSA-2022-5698.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5696 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5696" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5697 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5697" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5698 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5698" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5700 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5700" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5701 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5701" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5695 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5695" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5709 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5709" }, { "category": "external", "summary": "Debian Security Advisory DSA-5192 vom 2022-07-26", "url": "https://lists.debian.org/debian-security-announce/2022/msg00161.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5726 vom 2022-07-27", "url": "https://access.redhat.com/errata/RHSA-2022:5726" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5709 vom 2022-07-26", "url": "http://linux.oracle.com/errata/ELSA-2022-5709.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5726 vom 2022-07-27", "url": "http://linux.oracle.com/errata/ELSA-2022-5726.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5736 vom 2022-07-28", "url": "https://access.redhat.com/errata/RHSA-2022:5736" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5736 vom 2022-07-28", "url": "http://linux.oracle.com/errata/ELSA-2022-5736.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5756 vom 2022-07-29", "url": "https://access.redhat.com/errata/RHSA-2022:5756" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5757 vom 2022-07-29", "url": "https://access.redhat.com/errata/RHSA-2022:5757" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5755 vom 2022-07-29", "url": "https://access.redhat.com/errata/RHSA-2022:5755" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5754 vom 2022-07-28", "url": "https://access.redhat.com/errata/RHSA-2022:5754" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5753 vom 2022-07-28", "url": "https://access.redhat.com/errata/RHSA-2022:5753" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5758 vom 2022-07-29", "url": "https://access.redhat.com/errata/RHSA-2022:5758" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-107 vom 2022-07-28", "url": "https://downloads.avaya.com/css/P8/documents/101083044" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2610-1 vom 2022-08-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011733.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:5698 vom 2022-08-02", "url": "https://lists.centos.org/pipermail/centos-announce/2022-August/073599.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:5687 vom 2022-08-02", "url": "https://lists.centos.org/pipermail/centos-announce/2022-August/073598.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-121 vom 2022-08-05", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-121.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2707-1 vom 2022-08-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011827.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2819-1 vom 2022-08-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011920.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2856-1 vom 2022-08-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011952.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3152-1 vom 2022-09-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012164.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2022-1836 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1836.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2JAVA-OPENJDK11-2022-002 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALASJAVA-OPENJDK11-2022-002.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3708 vom 2024-06-06", "url": "https://access.redhat.com/errata/RHSA-2024:3708" } ], "source_lang": "en-US", "title": "OpenJDK: Mehrere Schwachstellen erm\u00f6glichen Codeausf\u00fchrung", "tracking": { "current_release_date": "2024-06-06T22:00:00.000+00:00", "generator": { "date": "2024-06-07T08:09:09.163+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0746", "initial_release_date": "2022-07-19T22:00:00.000+00:00", "revision_history": [ { "date": "2022-07-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-21T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat, Amazon und Oracle Linux aufgenommen" }, { "date": "2022-07-24T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-07-25T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-07-26T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Debian, Red Hat, Fedora und Oracle Linux aufgenommen" }, { "date": "2022-07-27T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-07-28T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-07-31T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-08-01T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-03T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2022-08-04T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-08-09T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-16T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-21T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-14T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-06-06T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "17" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "category": "product_name", "name": "Open Source OpenJDK", "product": { "name": "Open Source OpenJDK", "product_id": "185975", "product_identification_helper": { "cpe": "cpe:/a:oracle:openjdk:1.6.0" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version", "name": "Camel for Spring Boot 1", "product": { "name": "Red Hat Integration Camel for Spring Boot 1", "product_id": "T035240", "product_identification_helper": { "cpe": "cpe:/a:redhat:integration:camel_for_spring_boot_1" } } } ], "category": "product_name", "name": "Integration" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In OpenJDK existieren mehrere Schwachstellen. Diese sind auf Fehler in \"Oracle Java\" zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "185975", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T035240", "T004914", "2951", "T002207", "398363", "1727" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In OpenJDK existieren mehrere Schwachstellen. Diese sind auf Fehler in \"Oracle Java\" zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "185975", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T035240", "T004914", "2951", "T002207", "398363", "1727" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In OpenJDK existieren mehrere Schwachstellen. Diese sind auf Fehler in \"Oracle Java\" zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "185975", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T035240", "T004914", "2951", "T002207", "398363", "1727" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In OpenJDK existieren mehrere Schwachstellen. Diese sind auf Fehler in \"Oracle Java\" zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "185975", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T035240", "T004914", "2951", "T002207", "398363", "1727" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-34169" } ] }
gsd-2022-21549
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-21549", "description": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "id": "GSD-2022-21549", "references": [ "https://www.debian.org/security/2022/dsa-5192", "https://access.redhat.com/errata/RHSA-2022:5726", "https://access.redhat.com/errata/RHSA-2022:5736", "https://www.suse.com/security/cve/CVE-2022-21549.html", "https://access.redhat.com/errata/RHSA-2022:5757", "https://access.redhat.com/errata/RHSA-2022:5758", "https://ubuntu.com/security/CVE-2022-21549" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-21549" ], "details": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "id": "GSD-2022-21549", "modified": "2023-12-13T01:19:14.300268Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2022-21549", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Java SE JDK and JRE", "version": { "version_data": [ { "version_affected": "=", "version_value": "Oracle Java SE:17.0.3.1" }, { "version_affected": "=", "version_value": "Oracle GraalVM Enterprise Edition:21.3.2" }, { "version_affected": "=", "version_value": "Oracle GraalVM Enterprise Edition:22.1.0" } ] } } ] }, "vendor_name": "Oracle Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)." } ] }, "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data." } ] } ] }, "references": { "reference_data": [ { "name": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "DSA-5192", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2022/dsa-5192" }, { "name": "FEDORA-2022-34584d4257", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQICCJXXAYMCCXOO24R4W7Q3RSKCYDMX/" }, { "name": "https://security.netapp.com/advisory/ntap-20220729-0009/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220729-0009/" }, { "name": "FEDORA-2022-64431bccec", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKJCLA2GDNF4B7ZRKORQ2TIR56AHJ4VC/" }, { "name": "GLSA-202401-25", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202401-25" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:graalvm:21.3.2:*:*:*:enterprise:*:*:*", "matchCriteriaId": "601D92C4-F71F-47E2-9041-5C286D2137F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:graalvm:22.1.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "B18FE85D-C53D-44E9-8992-715820D1264B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:17.0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7AF3539B-0434-4310-AE88-F46864C7C20F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:17.0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0DF70EEA-EC9D-4FFC-B7BE-76F50C34D999", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:azul:zulu:17.34:*:*:*:*:*:*:*", "matchCriteriaId": "B6302149-28AA-481E-BC6C-87D05E73768A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EF6650C-558D-45C8-AE7D-136EE70CB6D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCAA4004-9319-478C-9D55-0E8307F872F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0F202E8-97E6-4BBB-A0B6-4CA3F5803C08", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)." }, { "lang": "es", "value": "Una vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: Libraries). Las versiones afectadas son Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 y 22.1.0. La vulnerabilidad f\u00e1cilmente explotable permite a un atacante no autenticado con acceso a la red por medio de m\u00faltiples protocolos comprometer a Oracle Java SE, Oracle GraalVM Enterprise Edition. Los ataques con \u00e9xito de esta vulnerabilidad pueden resultar en el acceso no autorizado a la actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n de algunos de los datos accesibles de Oracle Java SE, Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad es aplicada a las implantaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start con sandbox o applets Java con sandbox, que cargan y ejecutan c\u00f3digo que no es confiable (por ejemplo, c\u00f3digo que viene de Internet) y dependen de la sandbox de Java para la seguridad. Esta vulnerabilidad tambi\u00e9n puede ser explotada mediante el uso de APIs en el componente especificado, por ejemplo, mediante un servicio web que suministra datos a las APIs. CVSS 3.1, Puntuaci\u00f3n Base 5.3 (impactos en la Integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)." } ], "id": "CVE-2022-21549", "lastModified": "2024-01-17T15:15:08.940", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "secalert_us@oracle.com", "type": "Primary" } ] }, "published": "2022-07-19T22:15:12.147", "references": [ { "source": "secalert_us@oracle.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQICCJXXAYMCCXOO24R4W7Q3RSKCYDMX/" }, { "source": "secalert_us@oracle.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKJCLA2GDNF4B7ZRKORQ2TIR56AHJ4VC/" }, { "source": "secalert_us@oracle.com", "url": "https://security.gentoo.org/glsa/202401-25" }, { "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220729-0009/" }, { "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5192" }, { "source": "secalert_us@oracle.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
ghsa-c786-7jf2-46w9
Vulnerability from github
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
{ "affected": [], "aliases": [ "CVE-2022-21549" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-07-19T22:15:00Z", "severity": "MODERATE" }, "details": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "id": "GHSA-c786-7jf2-46w9", "modified": "2022-07-20T00:00:17Z", "published": "2022-07-20T00:00:17Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQICCJXXAYMCCXOO24R4W7Q3RSKCYDMX" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKJCLA2GDNF4B7ZRKORQ2TIR56AHJ4VC" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQICCJXXAYMCCXOO24R4W7Q3RSKCYDMX" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKJCLA2GDNF4B7ZRKORQ2TIR56AHJ4VC" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202401-25" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220729-0009" }, { "type": "WEB", "url": "https://www.debian.org/security/2022/dsa-5192" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ] }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.